Ever wanted to build a car hacking prototype within a month to learn more about a car? We understand the frustration in looking for general tutorials on getting started.
In this talk, we will address the moving parts to achieve a working prototype on a test bench. We will demonstrate how to reverse engineer the Controller Area Network (CAN) bus communication protocol using individual car components, spoofing packets using open source tools, and demonstrating exploitability with actual crafted payloads. Through adopting a systematic methodology, we demonstrate how an attacker could potentially exploit cars by compiling a comprehensive database that expedites the exploit development process.