A preview of the @CarHackingVillage Opening Ceremony at #defcon:
A preview of the @CarHackingVillage Opening Ceremony at #defcon:
A preview of the #CarHacking Village Opening Ceremony at #defcon33: @defcon.bsky.social
🇬🇧✨ Want to understand how modern vehicles can be hacked?
Join Gaël Musquet (@RatZillaS) for a live Car Hacking workshop during both days of leHACK 2025!
🚘 Learn about vulnerabilities in connected vehicles
🔓 See key spoofing, radio jamming & software attack demos
🗓️ June 27–28 | 10:00–18:00 | 📍Main Entrance – Outdoor Parvis Nord – Cité des Sciences
Don’t just lock your car—learn how to protect it.
🔎 https://lehack.org/car-hacking/
🎟️ https://www.billetweb.fr/lehack-2025-the-singularity
#leHACK #CarHacking #CyberSecurity
🇫🇷✨ Vous voulez comprendre comment une voiture peut être piratée ?
Gaël Musquet (@RatZillaS) vous propose un atelier Car Hacking en live pendant les deux jours de leHACK !
🚘 Vulnérabilités des véhicules connectés
🔓 Démos : ouverture par clé factice, attaque radio, injection logicielle
🗓️ 27–28 juin | 10h–18h | 📍Entrée principale – Parvis Nord – Cité des sciences
Protéger sa voiture, ça commence par la comprendre.
🔎 https://lehack.org/car-hacking/
🎟️ https://www.billetweb.fr/lehack-2025-the-singularity
#leHACK #CarHacking
Kali Linux 2025.2 is a game-changer for cybersecurity pros—packed with next-level car hacking tools and a revamped, MITRE ATT&CK-aligned interface. Ready to see how deep you can dive into vehicle and network security?
#kali2025
#cybersecurity
#ethicalhacking
#carhacking
#networkanalysis
Latest #Wireshark nightlies have a heuristic HSFZ dissector that come enabled by default. I hope it does not cause too much trouble so that it can remain enabled. May be useful for you people into #carhacking and for BMW petrolheads ;)
https://gitlab.com/wireshark/wireshark/-/merge_requests/20011
#scapy is also in the works, and more to come... :D
https://github.com/secdev/scapy/pull/4757
https://github.com/secdev/scapy/pull/4758
https://github.com/secdev/scapy/pull/4760
I have a #carhacking question: hypothetically, how possible is it to brick your car by sending the wrong bytes down the OBD 2 port? I was trying to enumerate the supported PIDs but I didn't prefix them with '01' and now my car is showing a bunch of error codes, the can bus can't connect, and I can't roll up my windows
Anyway, would unhooking the battery for 30 seconds fix this?
Here is a preview of the next release of Car Arsenal for Kali Linux 2025.2!
Renamed from CAN Arsenal to Car Arsenal to cover more car hacking stuff.
Added a lot of tools, feature and code rewrite! And im not even done!
Music used : @LinkinPark Lost in the Echo
https://youtube.com/shorts/iSm9BuxZ6HQ?si=-ma3bDIMr3-5Gd9o
@kimocoder @yesimxev @kalilinux @kalilinux@bird.makeup @davidbombal @androidmalware2
#kalilinux #kali #carhacking #canbus #car #cybersecurity #nethunter #kalinethunter #canarsenal #cararsenal #hack #hacking #cyber #linux #android #pentest #pentesting #security
🚨 A team of white-hat hackers just revealed a chilling remote hack on the 2020 Nissan LEAF! Using Bluetooth & DNS attacks, they gained full control-from steering to surveillance-without physical access. This exposes serious risks in EV security. Stay updated & cautious! 🔐🚗 #CyberSecurity #NissanLEAF #EVHack #BluetoothVulnerability #CarHacking #InfoSec #BlackHatAsia2025 #newz
Read more: https://cyberinsider.com/nissan-leaf-remotely-hacked-via-bluetooth-and-dns-attack/
Car hacking community, is there an android app I can use to send custom OBD commands via a Bluetooth dongle.
I use Leafspy for my car and other OBD apps, but I want to try sending some custom / manual commands.
Unfortunately my Mac doesn't want to play ball with my adapter either.
Here is a preview of NetHunter CAN Arsenal Release v.1.0
https://youtube.com/shorts/9yzQZYZ-DKU
Expected to be released with Kali Linux 2025.2
#nethunter #kalilinux #carhacking #canarsenal @kalilinux @kalilinux@bird.makeup @yesimxev @kimocoder @davidbombal @androidmalware2
Researchers demonstrate how hackers could remotely control 2020 Nissan Leaf vehicles, access location data, and even record in-car conversations through critical security flaws. See the demonstration and learn what Nissan is doing to address these serious vulnerabilities.
#SecurityLand #CyberWatch #CyberSecurity #AutomotiveSecurity #NissanLeaf #Vulnerability #CarHacking
With the Kali Linux 2025.1 release, i'm happy to said that CAN Arsenal as been released as well!
https://www.kali.org/blog/kali-linux-2025-1-release/
Here is a quick demo of @kalilinux #NetHunter CAN Arsenal. Im using a CAN USB Analyzer and Arduino with a CAN bus shield to emulate Car signals.
As its Experimental, you may face issues. If needed, contact me for guidance!
@androidmalware2 @davidbombal @kimocoder #car #canbus #carhacking #canarsenal #linux
Ooooooo this is how I know @dr34d loves me. Her bs dealer left it in her car after she financed through a different bank. I hope to have the firmware decompiled by this time tomorrow. Who uses an stm32 for a LoJack!?
I published my Documentation of CAN Arsenal for @kalilinux NetHunter
👇👇👇
https://v0lk3n.github.io/NetHunter/CAN-Arsenal/documentation
It should be released as experimental version in 2025.1!
I will keep updating it and add functionality to it!
You can also find it in Official Kali Linux Documentation :
Documentation :
https://www.kali.org/docs/nethunter/nethunter-canarsenal/
Kernel Modification :
https://www.kali.org/docs/nethunter/nethunter-kernel-9-config-8/
@yesimxev @kimocoder @kalilinux@bird.makeup
#NetHunter #KaliLinux #CarHacking #CANBus
Hacking Car Cameras Through The Cloud
Hacking Kia: Remotely Controlling Cars With Just a License Plate
Researchers discovered vulnerabilities allowing remote control of Kia vehicles via license plates.
#CyberSecurity #Hacking #CarHacking #EVs #KIA: "Today, a group of independent security researchers revealed that they'd found a flaw in a web portal operated by the carmaker Kia that let the researchers reassign control of the internet-connected features of most modern Kia vehicles—dozens of models representing millions of cars on the road—from the smartphone of a car’s owner to the hackers’ own phone or computer. By exploiting that vulnerability and building their own custom app to send commands to target cars, they were able to scan virtually any internet-connected Kia vehicle’s license plate and within seconds gain the ability to track that car’s location, unlock the car, honk its horn, or start its ignition at will.
After the researchers alerted Kia to the problem in June, Kia appears to have fixed the vulnerability in its web portal, though it told WIRED at the time that it was still investigating the group’s findings and hasn’t responded to WIRED’s emails since then. But Kia’s patch is far from the end of the car industry’s web-based security problems, the researchers say. The web bug they used to hack Kias is, in fact, the second of its kind that they’ve reported to the Hyundai-owned company; they found a similar technique for hijacking Kias' digital systems last year. And those bugs are just two among a slew of similar web-based vulnerabilities they’ve discovered within the last two years that have affected cars sold by Acura, Genesis, Honda, Hyundai, Infiniti, Toyota, and more."
https://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/
Driving a new Mercedes for a bit. I just had to do a proof of identity with a liveness check for some bullshit reason #telematics #carhacking
🙏A late post, but huge thanks to Ben Gardiner for an amazing car hacking workshop!
Your expertise on CAN, UDS on CAN, and the RAMN platform was invaluable. Our community greatly benefited from your insights and hands-on approach. Looking forward to more sessions!