A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Stop attacking your mother's car! - Charles Parker, II GrrCON 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Stop attacking your mother's car!
Charles Parker, II
GrrCON 2016

@charlesparkerii

In generations past the vehicle was a mechanical beast. The extent of technology was in the engine compartment. With the increase in technology and its application, there have been applications advantageous to vehicles. These range from simple displays to the recording and reporting of vehicle data. This has been implemented into vehicles for be benefit of the customer experience. This integration has been placed throughout the vehicle, from the tires up. The implementation has proven to be a zero sum game in that although these advances do improve the customer experience, they also have presented numerous points of attack. This presentation will review the general architecture, vulnerability points, different attacks used in general. Specific model issues will also be presented.

Back to GrrCON 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast