VDA Shenanigans: Attacking and Defending Vehicle Diagnostics Adapters

VDA Shenanigans: Attacking and Defending Vehicle Diagnostics Adapters

DEFCONConference via YouTube Direct link

Super Complicated Update Procedure

9 of 21

9 of 21

Super Complicated Update Procedure

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

VDA Shenanigans: Attacking and Defending Vehicle Diagnostics Adapters

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Shenanigans We Will Cover
  2. 2 What is a Vehicle Diagnostics Adapter (VDA)?
  3. 3 Attacker Plan
  4. 4 Reverse Hardware: Enumerate Components
  5. 5 Reverse Hardware: UART Time!
  6. 6 Obtain Firmware: UART Time!
  7. 7 Obtain Firmware, Reverse Format
  8. 8 Reverse Firmware Update
  9. 9 Super Complicated Update Procedure
  10. 10 Modify Firmware: Earth, Wind & Coldfire
  11. 11 Why is this a problem? (hypothetically)
  12. 12 Defender Problem
  13. 13 Defender Goal
  14. 14 Autotomic Binary Reduction (ABR)
  15. 15 Reverse Engineer Firmware - RTOS
  16. 16 Identify Feature Entry Points
  17. 17 ABR: Identify code & data to remove, and remove!
  18. 18 Defender Reflections
  19. 19 Cyber Truck Challenge -2-Hour Workshop using OFRAK and VDA
  20. 20 DC30 CHV CTF Challenges
  21. 21 Shenanigans We Covered

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.