Cybersecurity Workshops
General Overview
Stay ahead in the evolving automotive landscape with our cybersecurity workshops, designed to empower you with practical, hands-on skills and insights into embedded and vehicle security. Explore the fundamentals of automotive protocols, ECUs, and attack surface identification. Learn cutting-edge techniques in hacking real cars, from firmware reverse engineering to OEM design philosophies. Our automotive cybersecurity training covers CAN communication, firmware dumping, vulnerability assessment, and automation strategies for network and system security assessments. Fully customizable, our workshops ensure you gain the expertise to safeguard interconnected vehicles against emerging cyber threats.
Outline
- Attack Surface Identification: Learn to pinpoint vulnerabilities on Electronic Control Units (ECUs) for effective security assessments
- Low-Level CAN Communication: Understand the intricacies of CAN communication and vulnerabilities at the protocol’s foundational level
- Vehicle Architecture Overview: Gain insights into prevalent vehicle architectures and network topologies for comprehensive understanding
- Relevant Protocols Mastery: Acquire knowledge about essential protocols utilized in contemporary vehicles for targeted security analyses
- Hands-On Network Scanning: Engage in practical automotive network scans to identify potential vulnerabilities and weaknesses
- Diagnostic Protocol Exploitation: Explore techniques to attack diagnostic protocols, including firmware dumping and reverse engineering for in-depth analysis
- Security Access Breaching: Break through security access mechanisms deployed in modern vehicles to assess system vulnerabilities effectively
- Immobilizer Basics: Get an overview about current immobilizer systems
Applications
- Embedded Systems
- Automotive Systems
- Industrial Systems
- Aviation & Aerospace Systems
- Maritime Systems
- Defense Systems
- IoT (Internet of Things) Devices
Syllabus
- Fundamentals of vehicular networks & protocols
- Controller Area Networks: Explore low-level attacks, utilize Scapy CAN layer, understand DBC file format, investigate Man-in-the-Middle (MITM) attacks, implement AUTOSAR SecOC security mechanisms, and employ fuzzing techniques
- ISOTP: Understand the basics, investigate Man-in-the-Middle (MITM) attacks, and perform network scanning
- UDS / GMLAN: Utilize UDS and GMLAN in Scapy, manage Security Access, and conduct Network Scanning
- DoIP / HSFZ: Delve into the basics of protocols, implement DoIP and HSFZ in Scapy, and gain proficiency in their handling using relevant tools
- SOME/IP: Familiarize yourself with the basics of SOME/IP and explore associated tools for implementation and analysis.
- CCP / XCP / OBD2: Understand the fundamentals of CCP (CAN Calibration Protocol), XCP (Universal Measurement and Calibration Protocol), and OBD2 (On-Board Diagnostics) for vehicle diagnostics and communication
- OEM-specific knowledge: Dive into attacks on vehicles, explore security access implementations and update processes, gain an overview of OEM-specific tools, and understand electronic immobilizers in automotive systems.
- Hardware Reverse Engineering: Learn to identify interfaces, grasp the basics of JTAG (Joint Test Action Group) protocols, and explore various methods for reading out firmware from embedded systems
- Reverse Engineering: Get acquainted with Ghidra basics, understand common processor architectures, learn to handle memory maps, reverse engineer peripheral components, manage interrupt vector tables, identify automotive protocols like UDS (Unified Diagnostic Services), decode security access algorithms, analyze intercommunication between bootloader and flashloader, and reverse engineer state machines and AUTOSAR (AUTomotive Open System ARchitecture)
Exercise Environment
Remote ECU: The remote system facilitates the handling of the ECUs by avoiding wiring efforts. Available Manufacturers: BMW, VW, Opel, Tesla, Mercedes, Audi. The following ECU types are available: Body Domain Controllers, Gateway ECUs, Telematics ECUs, Airbag ECUs, Dashboard ECUs, Immobilizer ECUs
Physical ECU: Various ECUs will be brought on-site for training in hardware reverse engineering as well as handling ECUs
Virtualized vehicle: By simulating a vehicle and CAN messages while driving, participants can learn how to handle low-level CAN messages and how to manipulate them
Virtualized ECU: A modified digital twin of a real ECU, which includes various IT security exercises that can be performed by the participants independently
*product specifications and features are subject to change without prior notice as we continuously strive to improve our products