Automotive Security
Modern vehicles are computers on wheels, with 100+ Electronic Control Units (ECUs) communicating over CAN bus networks. Connected cars introduce attack surface through cellular modems, Wi-Fi, Bluetooth, and infotainment systems. This guide covers automotive penetration testing, from CAN bus exploitation to keyless entry attacks.
Safety Critical Systems
Vehicle Architecture
🔴 Critical Systems
- • Engine Control Unit (ECU)
- • Brake System (ABS/ESC)
- • Steering Control
- • Airbag Module
- • Transmission Control
🟠 Comfort Systems
- • Infotainment Head Unit
- • Climate Control
- • Power Windows/Locks
- • Instrument Cluster
- • Seat Adjustment
🔵 Connected Systems
- • Telematics Unit (TCU)
- • Cellular Modem (4G/5G)
- • Bluetooth / Wi-Fi
- • Tire Pressure Monitoring
- • Keyless Entry System
CAN Bus Protocol
Controller Area Network (CAN) is the primary communication protocol in vehicles. Key characteristics:
- Broadcast: All ECUs receive all messages (no addressing)
- No Authentication: Any ECU can send any message
- No Encryption: All traffic is cleartext
- Priority-Based: Lower CAN ID = higher priority
- Differential Signaling: CAN-H and CAN-L twisted pair (2.5V baseline)
Common Attack Vectors
1. OBD-II Port Access
Physical access to diagnostic port under dashboard. Connect CAN adapter (Macchina M2, CANtact) to sniff/inject traffic.
2. Keyless Entry Relay
Relay signal from key fob (inside house) to car, bypassing proximity check. Car thinks key is nearby and unlocks.
3. Infotainment Exploitation
Exploit vulnerabilities in head unit (often Linux-based). Pivot from infotainment to CAN gateway to send commands to critical ECUs.
4. Remote Telematics Attack
Exploit cellular modem or connected services (OnStar, Tesla app). Remote code execution can control vehicle functions over the internet.
Essential Automotive Hacking Tools
Hardware
- • Macchina M2
- • CANtact / CANable
- • ValueCAN
- • HackRF / YARD Stick One
Software
- • ICSim (CAN simulator)
- • CANalyze
- • Wireshark (CAN dissector)
- • Kayak
Analysis
- • python-can
- • CANUtils (Linux)
- • SavvyCAN
- • UDSim (UDS simulator)
Legal Resources
Guide Contents
Automotive Basics
Vehicle architecture and attack surface overview.
CAN Bus Fundamentals
Understanding the CAN protocol and hardware setup.
CAN Bus Attacks
Sniffing, injection, fuzzing, and DoS attacks on CAN.
OBD-II Diagnostics
Exploiting the OBD-II diagnostic interface.
Keyless Entry
RF attacks on vehicle key fobs and PKES.
Infotainment
Attacking in-vehicle infotainment systems.
Telematics
Vehicle telematics and connected car services.
ECU Firmware
Reverse engineering automotive ECU firmware.
Autonomous Vehicles
Security challenges in autonomous vehicles.