In the final part of the CAN hacking series, the focus is on manipulating CAN traffic, specifically analyzing ICSim speedometer traffic dumps, and utilizing Can-Hax, a custom fuzzing tool. Links to the ICSim project and the Can-Hax tool on GitHub are provided, along with summaries of previous installments.
Tag Archives: CAN
Hacking CAN Traffic Part 2: How to Capture and Manipulate CAN Packets
In the second part of a three-part video series on CAN bus analysis, viewers will explore practical techniques for CAN manipulation. The video covers tools like candump, cansend, and canplayer to manipulate CAN frames, focusing on analyzing traffic dumps to isolate packets for turn signals and door locks in ICSim.
Hacking CAN Traffic Part 1: An Introduction to CAN and ICSim
The first video in a three-part series on hacking Controller Area Networks (CAN) introduces the basics of CAN bus and essential Linux tools for monitoring traffic. It includes guidance on setting up the Instrument Cluster Simulator (ICSim) for automotive security. Subsequent videos will cover packet capture and fuzzing techniques.
Introducing: Can-Hax
Yesterday was New Software Day. I occasionally release a program or 2 that I’ve used to automate my life. In this case, I have release Can-Hax, which is a tool that I wrote to fuzz Controller Area Network (CAN) frames using a Linux OS with can-utils involved. CAN is a way for sensors, controllers, andContinue reading “Introducing: Can-Hax”
