Welcome to the first video in our three-part series on hacking Controller Area Networks (CAN)! In this tutorial, we’ll dive into the fundamentals of CAN bus, showing you how to set up and monitor traffic using essential Linux utilities like cansniffer, candump, and cansend. We’ll also guide you through compiling and running the Instrument Cluster Simulator (ICSim), a crucial tool for anyone interested in car hacking and automotive security.
Tools Mentioned:
- ICSim (Instrument Cluster Simulator): Explore the project on GitHub:
https://github.com/zombieCraig/ICSim - Can-Hax: Find the CAN fuzzing tool on GitHub:
https://github.com/rybolov/Can-Hax
Catch Up on the Series:
Part 2: CAN Packet Capture and Manipulation
Part 3: How to Perform CAN Packet Fuzzing
Published on February 22, 2022.
Last Updated on 1 month ago.

2 thoughts on “Hacking CAN Traffic Part 1: An Introduction to CAN and ICSim”