Torrent details for "Automobile Hacking and Security v2.0"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
2.58 GB
Info Hash:
c828cd6990996447d197a51c6cf194bc33874572
Added By:
Added:  
18-04-2023 11:57
Views:
1,479
Health:
Seeds:
1
Leechers:
0
Completed:
175
wide




Description
wide
Image error
Description

Have you ever thought the car you drive can also be hacked and it’s also vulnerable to hackers ?

Welcome to the second course on Automobile Hacking and Security version 2.0.

In our first course we created our base on automobile security, learned the protocol on which modern day vehicles operate and looked at tools through which we can find vulnerabilities in cars and worked on real vehicles as well.

In this course we will look at some advanced and interesting concepts and see how deep the rabbit hole goes. We will start this course with the overview of the first course so all things revised and clear.

Then we will implement a car simulator with higher difficulty levels and look for advanced tools on automobile security starting with CaringCaribou. We will see how we can find all the unique IDS in CAN Network. We will work on Unified Diagnostics Services (UDS) and also see Fuzzer Brute Force Attack.

Then we will look at another advanced tool on automobile security CANAnalyzer which is a graphical tool. We will do Sniff and Send CAN Packets Attack and Fuzzer Test.

After that we will cover On-Board Diagnostic II (OBD2). We will see OBD2 Protocols and create OBD2 Universal connectors as well to communicate with real vehicles.

After that we will create a version 2.0 device with MCP2515 module to communicate with real vehicles and get real time data from cars.

Then will do a practical demo on a real car with version 2.0 device and OBD2 connector.

After that we will move to the very interesting part of this course in which we will create an Electronic Control Unit model ECU. This ECU unit will help us test all tools which we study in this course. We will also connect our version 2.0 device with this ECU unit and try to Reverse Engineer CAN Frames.

In the last one important thing this course is NOT for everyone But for anyone who is passionate about cybersecurity and has the ability to think out of the BOX!
Who this course is for:

   For Cybersecurity Researchers
   Ethical Hackers
   Hobbyist and Learners
   Anyone passionate about Cyber Security, But! Can think out of the box!!!

Requirements

   Basic Knowledge of Linux
   Completed Automobile Hacking and Security v1.0 (Recommended)
   Hardware Requirements for Communicating with Real Vehicle (Find details inside course)

Last Updated 3/2023

  User comments    Sort newest first

by digitalsc4rz
    on 2023-04-29 02:49:07
avatarThanks
0 |
:) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg

CAPTCHA Image 
Anonymous comments have a moderation delay and show up after 15 minutes

Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes