http://www.forbes.com/sites/thomasbrewster/2015/03/25/hack-a-car-for-60-dollars/
Former Tesla Intern Releases $60 Full Open Source Car Hacking Kit For The
Masses
Thomas Fox-Brewster  3/25/2015

[image  
http://blogs-images.forbes.com/thomasbrewster/files/2015/03/Screen-Shot-2015-03-24-at-16.37.20.png
CANtact car hacking device  Eric Evenchick’s CANtact car hacking device that
plugs into cars’ ODB2 port
]

Eric Evenchick knows what it’s like to be at the mercy of modes of
transport. That might be why the former Tesla intern is so keen to hack his
way to gaining greater control over the vehicles he travels in. When we
speak over encrypted call app RedPhone, he’s stuck in Hong Kong airport
waiting for a delayed flight to Singapore, where he’ll announce the open
sourcing of the CANard tool during the BlackHat Asia conference.

His code will make it cheaper and easier than ever before for tinkerers to
get to the innards of their connected cars to determine if there are any
useful tweaks they can make, or any worrisome security vulnerabilities that
more malicious hackers could exploit. Evenchick is hopeful CANard, based on
the widely-used and much-loved Python language, will have a greater impact
on the car industry in general. It should allow security researchers of all
ilks to easily probe cars for weaknesses, which, Evenchick hopes, will get
them to take vehicle hacking more seriously.

His own tinkering with the code has turned CANard into a more powerful tool
in recent weeks. In particular, it now has the ability to carry out proper
diagnostics over the Controller Area Network (CAN), the network-on-wheels
found in almost all modern automobiles to send data around the vehicle, he
tells FORBES. This means anyone who knows or learns Python (it’s a good
language for newcomers to coding) can start to probe what functions can be
accessed using their computer, whether they run an Apple Mac, Microsoft
Windows or Linux PC. 

They’ll also need to buy some associated hardware to connect laptops to the
diagnostics, or OBD2, port, which Evenchick has also produced. He’ll be
shipping CANtact  [
http://cantact.io/
], a CAN to USB interface for the low, low price of $59.95 (USB and OBD2
cable not included). There will only be 100 available in the first batch,
but the hardware is open source too, meaning it’s easily replicable and even
cheaper for those with the right skills.

In recent months, breaches of car security have been repeatedly carried out
by the security research community. In January, Corey Thuen revealed a
startling lack of security in an OBD2 dongle from Progressive Insurance.
Later in the year, DARPA-backed hackers took control of a car remotely using
a laptop.

Previously, car hacking was the domain of those who had access to more
expensive, bespoke hardware and knew the protocols used by cars. But it has
been increasingly opened up to the masses in recent years. Researchers Chris
Valasek and Charlie Miller open sourced their own car cracking tools back in
2013, which also contained Python scripts for vulnerability testing,
followed by a guide to hacking vehicles without actually having access to an
automobile. But they didn’t include the hardware component as Evenchick has
done and he believes his full toolset is more accessible that what has come
before.

“I want to make this easy. Python developers can get the code in one line …
and start working with it. It’s also built as a library rather than just a
collection of scripts. The plan is to build more functionality out around
it, and contribute that back into an open source tool,” he says over email
after our call.

Researchers aren’t racing each other to hack cars, however. As the majority
of car manufacturers aren’t keen to open their doors to security
researchers, and it isn’t cheap to buy and test vehicles, Evenchick, Miller,
Valasek and many others are driving the message home that everyone should
start probing their automobiles for vulnerabilities so that makers wake up
to the problems. Better that than waiting for a disaster to change the way
manufacturers think about security, says Evenchick.

“Making diagnostics available for cheap means that we can not only audit the
security of these systems, but also use them for their intended purpose:
fixing cars,” he adds. “One of the big problems is access to vehicles. Ford,
let’s say, won’t let anyone with security skills in to hack it.

“I don’t have access to as many cars as I like… I’ve literally borrowed
friends cars.” He says he repeatedly finds weak authentication across cars’
diagnostic functions. “You have the ability to read and write data that you
really shouldn’t.”

Craig Smith, founder of the OpenGarages car security body and CEO at
security research firm Theia Labs, believes Evenchick’s open source tools
are great for lowering the barrier of entry for researchers and anyone
interested in understanding how their car works. As vehicles can have
upwards of 100 million lines of code running on them, it’s makes it
essential as many security researchers as possible can validate these
systems, he adds.

But there is still one “missing piece of the puzzle”: what to do with
researchers’ findings. “Very few auto manufacturers have published processes
detailing how a researcher should contact them about their findings. Without
these policies researchers do not know how to contact the manufacturers in a
way that will be productive in addressing the issue. This can lead to
researchers being sued and/or getting cease and desist letters.”

Evenchick has been working on car technology for almost half a decade,
during which time he interned at Tesla for four months in 2012, building
some of the software functionality in the famous electric car. Though he
isn’t permitted to go into detail on his time there, he says the company has
one of the more responsible approaches to car security, with its bug bounty
offering funds for vulnerability disclosures and a full information security
programme.

Other car makers aren’t as forward-thinking, but a handful of new groups, in
particular I Am The Cavalry, are working hard with industry and in
Washington DC to enforce better practices across vehicle manufacturers. With
pressure mounting on them to act, car companies might feel the need to act
before a catastrophe strikes.
[© forbes.com]



http://www.bidnessetc.com/37921-how-safe-are-vehicles-after-on-air-software-updates/
How Safe Are Vehicles After On-Air Software Updates?
Mar 25, 2015 ... Over-the-air software updates are not something new.  ...
Tesla announced a software update ... Ford announced it will start air
updates ...




For EVLN posts use:
http://evdl.org/evln/
http://electric-vehicle-discussion-list.413529.n4.nabble.com/template/NamlServlet.jtp?macro=search_page&node=413529&query=subject%3Aevln+NOT+subject%3Are&days=0&sort=date


{brucedp.150m.com}



--
View this message in context: 
http://electric-vehicle-discussion-list.413529.n4.nabble.com/Evenchick-s-60-Open-Source-CAN-Hacking-Kit-tp4674630.html
Sent from the Electric Vehicle Discussion List mailing list archive at 
Nabble.com.
_______________________________________________
UNSUBSCRIBE: http://www.evdl.org/help/index.html#usub
http://lists.evdl.org/listinfo.cgi/ev-evdl.org
For EV drag racing discussion, please use NEDRA 
(http://groups.yahoo.com/group/NEDRA)

Reply via email to