Abstract
The Controller Area Network (CAN) is the most common protocol interconnecting the various control units of modern cars. Its vulnerabilities are somewhat known but we argue they are not yet fully explored—although the protocol is obviously not secure by design, it remains to be thoroughly assessed how and to what extent it can be maliciously exploited. This manuscript describes the early steps towards a larger goal, that of integrating the various CAN pentesting activities together and carry them out holistically within an established pentesting environment such as the Metasploit Framework. In particular, we shall see how to build an exploit that upsets a simulated tachymeter running on a minimal Linux machine. While both portions are freely available from the authors’ Github shares, the exploit is currently subject to a Metaspoilt pull request.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
International Organization for Standardization: Road vehicles – Controller area network (CAN) – Part 1: Data link layer and physical signalling (2015). https://www.iso.org/standard/63648.html
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21, 993–999 (1978)
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61042-1_43
Needham, R.: Keynote address: the changing environment. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 1–5. Springer, Heidelberg (2000). https://doi.org/10.1007/10720107_1
Valasek, C., Miller, C.: Remote Exploitation of an Unaltered Passenger Vehicle (2015). http://illmatics.com/Remote%20Car%20Hacking.pdf
Valasek, C., Miller, C.: CAN Message Injection (2016). http://illmatics.com/can%20message%20injection.pdf
Smith, C.: The Car Hacker’s Handbook: A Guide for the Penetration Tester, 1st edn. No Starch Press, San Francisco (2016)
Meier, J.N.: Kayak (2014). https://github.com/dschanoeh/Kayak
Rapid7: Metasploit framework. https://github.com/rapid7/metasploit-framework
Chris Valasek, C.M.: Adventures in Automotive Networks and Control Units (2014). http://illmatics.com/car_hacking.pdf
Biondi, P.: Crazy-tachymeter (2018). https://github.com/pietrobiondi/Crazy-Tachymeter
Biondi, P.: Crazytachymeter, exploit for can-bus (2018). https://github.com/rapid7/metasploit-framework/pull/10127
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Bella, G., Biondi, P. (2018). Towards an Integrated Penetration Testing Environment for the CAN Protocol. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2018. Lecture Notes in Computer Science(), vol 11094. Springer, Cham. https://doi.org/10.1007/978-3-319-99229-7_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-99229-7_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99228-0
Online ISBN: 978-3-319-99229-7
eBook Packages: Computer ScienceComputer Science (R0)