Overview
Explore a comprehensive security research presentation on Mercedes-Benz vehicles, focusing on the vulnerabilities introduced by modern intelligent functionalities. Delve into the methodologies used to investigate connected car security, from hardware analysis to gaining full system access. Learn about reverse engineering techniques, dynamic debugging, cloud control exploitation, and firmware analysis. Discover how researchers uncovered vulnerabilities in the head unit, Hermes system, and various communication channels. Gain insights into troubleshooting methods, root system access, and the implications for fleet operations and incident response in the automotive industry.
Syllabus
Introduction
Welcome
Agenda
Head Unit
Hermes
PCB
Nanoflash
Unknown Mapping
Spare Area
Reverse Engineering
Dynamic Debugging
Full Access
Cloud Control
SIM Card Adapter
Troubleshooting
Root System
IPv4 Address
Carrier Internet
Firmware Analysis
Certificate Decryption
Safety Channel
SMS Channel
AP Data
Conclusion
Fleet Stack Ops
Incident Response
Key Messages
Thank You
Taught by
Black Hat