During this 3-day course, participants will work on custom hardware mimicking key ECUs of a connected car, through 4 different modules. Each module has several hands-on exercises to practice and understand techniques that will be taught. First, attendees will learn how to set an automotive test bench, to be able to create their own or craft a car-in-a-box.
Once the test bench is working, a day will be dedicated to delve into In-Vehicle Infotainment unit, which expose the wider attack surface through its USB, Bluetooth and Wi-Fi connectivity. Participants will learn how to extract an IVI filesystem without using a chip-off technique and analyze it to find out how to activate the Engineer mode. We will also look at how we can emulate an USB device.
Network connectivity of a modern vehicle is managed by the TCU and trainees will learn how to set an LTE test network and how to modify the ECU to intercept communication and mimic a back-end server to interact with the ECU. Participant will also learn how to exploit the hardware architecture of such equipment in order to bypass a security.
Module 1 – building an automotive test bench
- Which ECU to select and how to collect them
- Gathering OEM technical documentation to identify ECU pinout
- Analysis of ECU internal
- Wiring up the bench
- Analysis of the main buses (CAN-FD, 10Base-T1S)
- Bypassing miscellaneous protection
- Emulating sensors
Module 2 – Hacking IVI
- Hardware architecture
- Extracting IVI filesystem
- Recovering Personally Identifiable Information
- Searching and enabling Engineer mode
- Introduction to Android Automotive
- Emulating USB devices to assess USB connectivity
Module 3 – Hacking TCU
- Hardware architecture
- Dump TCU filesystem
- Exploit on-board communication to bypass ECU protection
- Connect TCU to a LTE test network
- Setting up a LTE test network
- Intercept data from the TCU and redirect communications
- Mimic a secured backend server to interact with the TCU