Introduction of Vehicle
Vehicle network and attacks
– Briefing ECU
– Briefing of ECU
– Briefing of Vehicle Protocols
– Understanding and briefing CANBUS protocol
– Briefing of CANBUS frame
– Briefing of CAR hacking Tools
– Eavesdropping of Canbus massages
– Reverse Engineering of CANBUS – Identify the Arbitration ID of specific vehicle event.
– Attacks on cluster
– Replay attacks.
– Sending Forged CANBUS messages
– DOS Attack on CANBUS network
– Canbus Fuzzing
– Bus-Off Attack
– Error Passive spoof attack
– Freeze Doom Loop attack
– Bypass gateways with help of Janus Attack
– Introduction to Seed and key bypass
– Briefing of UDS
– Enumeration of supported diagnostic services.
– ECU reset service attack.
– Enumeration of Dynamic Data Identifiers
Infotainment (IVI –In vehicle infotainment)
Bluetooth Classic/BLE
– Introduction and protocol Overview
– Reconnaissance (Active and Passive) with HCI tools
– Attacks over RFcom
– L2cap smashing.
– GATT service Enumeration
– Sniffing GATT protocol communication
– Reversing GATT protocol communication
– Read and writing on GATT protocol.
– Fuzzing GAT protocols
Wifi
– Breaking Wifi Password
– DOS attack
– Intercept communications
USB
– Fuzzing on USB stack
– USB interception and attacks on specific classes
Introduction of MOST Protocol
Fleet Management System
GPS Attacks
– Miss guiding position.
– Tracking Vehicle Movement
– GPS spoofing attacks
Key fobs
– Introduction
– Recon of Key fobs frequency
– Reverse engineering of Key fob data
– Sending malformed key fobs request
– Jamming at RX and TX
– Defeating encoding mechanism
– Replay Attack
– Attack on key fob
Hardware Analysis I2C
– Introduction
– I2C Protocol
– Interfacing with I2C
– Manipulating Data via I2C
– Sniffing run-time I2C communication
SPI
– Introduction
– SPI Protocol
– Interfacing with SPI
– Manipulating data via SPI
– Sniffing run-time SPI communication
UART
– Introduction
– Identifying UART
– Automated Way
– Manually
– Debugging over UART
JTAG/SWD
– Introduction
– Identifying JTAG/SWD
– Automated Way
– Manually
– Debugging over JTAG/SWD
– Dumping data and manipulating memory address and data
Firmware Reversing
– Identifying compression and types
– Firmware Analysis
– Simulating Firmware
ARM
– Architecture
– Instruction set
– Procedure call convention
– System call convention
– Reversing techniques
– Buffer overflow attacks
Course Features
- Lectures 0
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 0
- Assessments Yes






