This workshop equips attendees with a foundational understanding of Bluetooth Low Energy (BLE), and Controller Area Network (CAN). Through theory and practical exercises, participants will gain insights into BLE and CAN communication, potential vulnerabilities, and best practices for securing these interactions. The hands-on training involves hacking a BLE communication link between a simulated car and a mobile application. The exercises utilize open-source tools which can be used with easily accessible hardware so the attendees can build up a similar setup on their own after the workshop.
The participants will use some of the most widely used Bluetooth hacking tools like BLE sniffers (ubertooth, nRF sniffer), BLE packet injectors (gatttool, hcitool). The exercises will include discovering the services advertised by the virtual car, overwriting characteristics which will change the behaviour of the virtual car.
Hacking into your car through BLE! A Hands-on Testing Demo
This workshop equips attendees with a foundational understanding of Bluetooth Low Energy (BLE), and Controller Area Network (CAN). Through theory and practical exercises, participants will gain insights into BLE and CAN communication, potential vulnerabilities, and best practices for securing these interactions. The hands-on training involves hacking a BLE communication link between a simulated car and a mobile application. The exercises utilize open-source tools which can be used with easily accessible hardware so the attendees can build up a similar setup
Get connected. How to interface to modern cars.
What defines a car? Is it software is it Hardware? The game is on and software is playing a bigger part with every released car. real Software in modern cars started with the CAN-Bus and the need for a electronic synchronisation between engine and transmission in the 90s. Later emission regulations changed the game and entertainment took a bigger role. Now we have even nearly software defined cars. Maybe you were lucky and got one of the few spaces of my
Intelligence Analysis: Activity Group Categorization
You’ve heard of numerous attacker groups that act persistently, driven by either financial or political motives. Intelligence analysts categorize these groups by considering various elements that help link attacks, describe the capabilities of the attacker groups, understand their intentions, and better prepare the organizations they protect. This interactive session will not only provide valuable insights into some analytical techniques but also involve all participants in hands-on activities. You'll work in teams to apply what you learn in real-time scenarios. To