Completed
Fixed by Tesla
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Over-the-Air - How We Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Source view
- 3 Memory view
- 4 Fill with ArrayStorage
- 5 Refill with Uint32Array
- 6 Explore Kernel
- 7 QtCarBrowser AppArmor rules
- 8 Fix solution in V2
- 9 Gateway file operation protocol
- 10 Gateway diagnostic protocol
- 11 Gateway update
- 12 Filesystem of the gateway
- 13 OTA Overview
- 14 Cloud - Car: Firmware Deploy
- 15 Ethernet Connected ECUs - Step 1
- 16 Traditional ECUs: In Bundle
- 17 Traditional ECUs: Firmware Info
- 18 Traditional ECUS: Create and Send Files
- 19 How Easter egg works?
- 20 Triggers on CID
- 21 Start on BCCEN
- 22 Easter egg start
- 23 How we patch
- 24 Patch in CID
- 25 Reverse of ECUS
- 26 Patch of BCCEN
- 27 Patch of BCFRONT
- 28 Autopilot ECU
- 29 Ape-updater
- 30 Commands for update
- 31 m3_factory_deploy
- 32 Exploit
- 33 Get Root
- 34 Fixed by Tesla
- 35 Fully Compromised
- 36 Tesla's Response
- 37 Security Enhancement