Overview
Explore a detailed security analysis of dash cam vulnerabilities in this DEF CON 32 conference presentation that examines network-connected devices from multiple countries including South Korea, USA, Germany, and China. Learn about the discovery of zero-day vulnerabilities like OS Command Injection, Logical Bugs, and insufficient authentication found during boot processes, configuration changes, and custom protocol communications. Follow the comprehensive analysis process from firmware acquisition and file system extraction to boot logic analysis and remote debugging. Discover how 4 out of 10 analyzed dash cams shared the same OEM board and similar vulnerabilities, allowing successful exploitation across multiple devices. Gain insights into common security vulnerabilities, preventive measures, and the importance of implementing stronger security standards in the growing dash cam industry to protect vehicle and personal data.
Syllabus
DEF CON 32 - Inside Dash Cam Custom Protocols and Discovered 0days - Hyo Jin Lee & Hanryeol Park
Taught by
DEFCONConference