What You'll Learn:
- Build an accurate threat model for your vehicle
- Reverse engineer the CAN bus to fake engine signals
- Exploit vulnerabilities in diagnostic and data-logging systems
- Hack the ECU and other firmware and embedded systems
- Feed exploits through infotainment and vehicle-to-vehicle communication systems
- Override factory settings with performance-tuning techniques
- Build physical and virtual test benches to try out exploits safely
Table of contents:
Introduction
Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engineering the CAN Bus
Chapter 6: ECU Hacking
Chapter 7: Building and Using ECU Test Benches
Chapter 8: Attacking ECUs and Other Embedded Systems
Chapter 9: In-Vehicle Infotainment Systems
Chapter 10: Vehicle-to-Vehicle Communication
Chapter 11: Weaponizing CAN Findings
Chapter 12: Attacking Wireless Systems with SDR
Chapter 13: Performance Tuning
Appendix A: Tools of the Trade
Appendix B: Diagnostic Code Modes and PIDs
Appendix C: Creating Your Own Open Garage