26
26
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 26
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=knEV4u7yJdU Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
50
50
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 50
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=X4szarzU3Rc Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
36
36
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=9Wg4lzMasMo Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
117
117
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 117
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=0O3pwRHYYKg Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
9
9.0
Jan 15, 2021
01/21
by
(MaverickIdeas)
data
eye 9
favorite 0
comment 0
This enclosure was designed for the Macchina hardware specifically to include the XBEE module by Craig Sanstrom. It has channels for light pipes that I was able to install with a clear filament. Also accessible is the reset button just in case. We also used the clear filament to make a small circle window for the RGB LED up front. Use #2x3/8” Plastite screw. McMaster Carr part# 90380A008
Topics: thingiverse, Electronics, stl, OBD2, Car_hacking_village, xbee, macchina, hack_the_planet
25
25
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 25
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=uIj7wkAoJ6Y Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
32
32
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=FEpMtMLAxOU Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
Car alarm hacking demonstration Source: https://www.youtube.com/watch?v=aZUQmJMuf8c Uploader: Pen Test Partners LLP
Topics: Youtube, video, Science & Technology, hacking, car hacking, IoT security, Automotive security,...
Securing vehicles is a complex challenge. Their increased connectivity leave them to a wide attack surface. The diversity in the technologies used also requires to develop different security assessment techniques. From an attacker’s point of view, one difficulty is the manufacturer-specific nature of the technologies used. The automotive industry is a complex ecosystem, composed of different OEMs and suppliers, at different levels of the production chain. This variety of actors lead to...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, keisuke hirata, autosec,...
Many of today’s cars have upgraded from the old RKE (remote keyless entry) keyfob to PKE (passive keyless entry) system making it more convenient for end users. A car equipped with the PKE system allows the driver to unlock the car by being in proximity of the vehicle or by touching the handle of the door while in possession of the keyfob. In addition, PKE equipped vehicles can be started and driven without the driver inserting the key into the keyhole manually. (For a better understanding of...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, jun li, qing yang,...
21
21
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 21
favorite 0
comment 0
Today, most vehicle manufacturers in the US connect their vehicles to a type of network and delegate controls to mobile or web applications upon vehicle purchasing. Thankfully, security research for consumer devices are now exempt from DMCA which enables us to audit and assess our connected vehicles. Like many devices in the IoT space, a single software bug in connected vehicles can compromise the entire ecosystem. In this talk, we will demonstrate the methodology used to discover and remotely...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
32
32
Apr 17, 2018
04/18
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Over the past few years, cars and automotive systems have gained increasing attention as cyber-attack targets. Cars are expensive. Breaking cars can cost a lot. So how can we find vulnerabilities in a car with no budget? We’ll take you with us on a journey from zero car security validation experience through the discovery and disclosure of multiple remotely-exploitable automotive vulnerabilities. Along the way, we’ll visit a wrecking yard, reassemble (most) of a 2015 Nissan Leaf in our lab,...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
OwnStar is a device that can locate, unlock and remote start any vehicle with OnStar RemoteLink after intercepting communication between the RemoteLink mobile app and OnStar servers. It can also unlock (and more) BMW Remote, Mercedes-Benz mbrace, Chrysler Uconnect, and Viper SmartStart. More technicals details to come at Defcon and in a future video. Since my communications with GM, GM/OnStar have resolved this issue for more than 3 million RemoteLink users! Read more:...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, onstar, ownstar,...
30
30
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 30
favorite 0
comment 0
The Car Hacking Village is a group of Professional and Hobbyist car hackers who work together to provide hands-on, interactive car hacking learning, talks, hardware, and interactive contests. Source: https://www.youtube.com/watch?v=-aJUUdKRy_k Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
49
49
Sep 22, 2016
09/16
by
DEFCONConference
movies
eye 49
favorite 0
comment 0
To improve road safety and driving experiences, autonomous vehicles have emerged recently, and they can sense their surroundings and navigate without human inputs. Although promising and proving safety features, the trustworthiness of these cars has to be examined before they can be widely adopted on the road. Unlike traditional network security, autonomous vehicles rely heavily on their sensory ability of their surroundings to make driving decision, which opens a new security risk. Thus, in...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DC24, DC-24, hack, hacker, hacking,...
10
10.0
Apr 17, 2018
04/18
by
DEFCONConference
movies
eye 10
favorite 0
comment 0
Vehicle-to-vehicle (V2V) and, more generally, vehicle-to-everything (V2X) wireless communications enable semi-autonomous driving via the exchange of state information between a network of connected vehicles and infrastructure units. Following 10+ years of standards development, particularly of IEEE 802.11p and the IEEE 1609 family, a lack of available implementations has prevented the involvement of the security community in development and testing of these standards. Analysis of the WAVE/DSRC...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
27
27
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 27
favorite 0
comment 0
OpenXC builds its firmware -- for both the open and proprietary builds -- using JSON data structures which define the CAN signals. These definitions are akin to the CAN database files (.dbc) files. Reverse engineering of the open openXC builds (as an educational excersise) reveals that it is a straightforward matter to identify and extract the CAN signal definitions from the binary. Attendees will learn: What are dbc files? How strings lead reverse engineers to interesting code via backwards...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
30
30
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 30
favorite 0
comment 0
Getting started in car hacking can be a daunting and expensive hobby. In this talk I am going to walk you through what you need to buy (and what you can likely skip). I will also be releasing a quick start guide and a script to help new car hackers build a "Car Hacking" system. Source: https://www.youtube.com/watch?v=YFMqGyWyWCo Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
68
68
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 68
favorite 0
comment 0
The security of automobiles accesses control system is a topic often discussed. Today's vehicles rely on key-fob control modules, to ensure the vehicle is accessible to authorized users only. While most traditional automobile key-fob systems have been shown to be insecure in the past, here comes a game changer. Instead of the regular key-fob system, some car owners will be able to access their vehicle by having their smartphone authenticate as a digital car key. In this talk, we will reveal the...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
44
44
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 44
favorite 0
comment 0
There exist several approaches to misbehavior detection in V2X networks in research literature, many of them not necessarily taking automotive restrictions into account. Only few approaches do and there is only one approach that has been tested in actual vehicles as far as I know. And that approach has it challenges - although it is an important first step towards implementation. I will present how this (and one or two other) approach works and how it can be tricked. Although misbehavior...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
28
28
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
The presentation will cover security implications of GPS and positioning attacks. We will discuss real world attacks and incidents. We will touch upon increased reliance on positioning data in accident reconstruction and assistive driving technologies. Source: https://www.youtube.com/watch?v=i3S9wiHF8c0 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
55
55
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 55
favorite 0
comment 0
Golang is a pretty nifty language, and it's remarkably well suited for car hacking. SocketCAN provides a great framework for interacting with CAN devices, so why not use it from Go? We'll present an open source Go library for making SocketCAN easy, and show how to work with raw CAN and ISOTP data. Attendees will get all the info they need to start hacking CAN buses with Go. Source: https://www.youtube.com/watch?v=PlOj0Mt-2NM Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
36
36
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
The Controller Area Network (CAN) bus has been mandated in all cars sold in the United States since 2008. But CAN is terrible in many unique and disturbing ways. CAN has served as a convenient punching bag for automotive security researches for a plethora of reasons, but all of the available analysis tools share a shortcoming. They invariably use a microcontroller with a built-in CAN peripheral that automatically takes care of the low-level (ISO layer 1 and 2) communication details, and ensures...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
31
31
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 31
favorite 0
comment 0
Nowadays any recent car up to 5 years old comes with something called “Infotainment”, this is that IPad-looking screen that allows you to use the GPS Navigation, select your favorite music from your IPod, make or receive calls while speaking through the Car’s speakers, or even ask the Car to read a SMS message for you, that along with the latest self-driving technologies popping up everywhere cannot longer be handled by a microcontroller, it requires an embedded OS to support all those...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
54
54
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 54
favorite 0
comment 0
The Automotive Exploitation Sandbox is a hands-on educational tool designed to provide stakeholders with little to no previous exposure to automotive security a hands-on experience with real hardware following a basic attack chain against a typical automotive development board. The attack chain provides instructions for the user to remotely exploit, escalate privilege, exfiltrate data, and modify memory using synthetic vulnerabilities placed on a remote test platform running an OS and hardware...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
61
61
Nov 1, 2018
11/18
by
DEFCONConference
movies
eye 61
favorite 0
comment 0
Unified Diagnostic Services (UDS) provides a powerful interface into vehicle diagnostics. OEMs use these services to update firmware, manipulate calibration data, send and receive information from vehicle ECUs, and now more recently for over the air updates. This talk pulls back the curtain on automotive bootloaders and how poor security design or implementation choices can be used by attackers to exfiltrate firmware or even gain persistent code execution. Source:...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
110
110
Sep 19, 2018
09/18
by
DEFCONConference
movies
eye 110
favorite 0
comment 0
Hacking Driverless Vehicles by Zoz Cannytrophic Design Are driverless vehicles ripe for the hacking? Autonomous and unmanned systems are already patrolling our skies and oceans and being tested on our streets and highways. All trends indicate these systems are at an inflection point that will show them rapidly becoming commonplace. It is therefore a salient time for a discussion of the capabilities and potential vulnerabilities of these systems. This session will be an informative and...
Topics: Youtube, video, Science & Technology, Robotics (Invention), Zoz, Security, Autonomous Car...
In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=qFA3kFj4uwY Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, hacking, rootkits, ethical hacking, hacker, installing rootkit,...
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=XJ2w98nRe7Q Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, learn ethical hacking for free, hacking course,...
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=jdPS_qcxS10 Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, hacker, learn hacking, mobile hacking, why i quit...
595
595
Apr 13, 2020
04/20
by
symbolcrash.com
audio
eye 595
favorite 0
comment 0
In this episode of the Hack the Planet Podcast: We talk to Craig Smith, author of The Car Hacker’s Handbook, about DRM, car hacking, and the future of virtual conferences. http://opengarages.org https://www.carhackingvillage.com https://www.cybertruckchallenge.org https://www.grimm-co.com/grimmcon Be a guest on the show! We want your hacker rants! Give us a call on the Hacker Helpline: PSTN 206-486-NARC (6272) and leave a message, or send an audio email to podcast@symbolcrash.com. Original...
Topics: hack the planet, security, hackers, podcast, symbol crash, no starch press, DefCon, Car Hacking,...
We Have A Discord : https://discord.gg/NEjz9r Zayka_Girl does gaming streams https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=QXj2sYRuk8k Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, learn hacking, hacker, ethical hacking, fortnite hacking,...
In This Episode: New computers, and old languages. The Earth's shifting magnetic fields are screwing up GPS (sort of). The U.S. government shutdown is affecting .gov web sites for an interesting reason. Pixels on your wall. Tesla says "Pwn Us". Can the police make you unlock your phone? This Week's Hosts Randy Cassingham, founder of This is True and the Internet Spam Primer. Leo Notenboom, "Chief Question Answerer," at tech education site Ask Leo! Gary Rosenzweig host and...
Topics: 1984, 911 misdial, Andre Kuipers, Apple II, Astronaut, Atari, AutoSSL, Biometrics, Bug bounty, Butt...
Source: https://tehpodcast.com/teh-054-level-up-battlestation/