|
Product Description
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack.The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to:
–Build an accurate threat model for your vehicle
–Reverse engineer the CAN bus to fake engine signals
–Exploit vulnerabilities in diagnostic and data-logging systems
–Hack the ECU and other firmware and embedded systems
–Feed exploits through infotainment and vehicle-to-vehicle communication systems
–Override factory settings with performance-tuning techniques
–Build physical and virtual test benches to try out exploits safely
If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.
Customers Who Bought This Item Also Bought
- A Comprehensible Guide to Controller Area Network
- Controller Area Network Prototyping with Arduino
- Hacking Connected Cars: Tactics, Techniques, and Procedures
- A Comprehensible Guide to J1939
- Real-World Bug Hunting: A Field Guide to Web Hacking
- Fotag OBD2 16 pin to DB9 RS232 Serial Port Adapter Cable Diagnostic Extension Cable with Power Switch to Avoid Battery Drain 1.5M 5ft
- Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Black Hat Python: Python Programming for Hackers and Pentesters
*If this is not the "The Car Hacker's Handbook: A Guide for the Penetration Tester" product you were looking for, you can check the other results by clicking this link. Details were last updated on Dec 8, 2024 02:35 +08.