The Controller Area Network (CAN) is the most common protocol interconnecting the various control units of modern cars. Its vulnerabilities are somewhat known but we argue they are not yet fully explored -- although the protocol is obviously not secure by design, it remains to be thoroughly assessed how and to what extent it can be maliciously exploited. This manuscript describes the early steps towards a larger goal, that of integrating the various CAN pentesting activities together and carry them out holistically within an established pentesting environment such as the Metasploit Framework. In particular, we shall see how to build an exploit that upsets a simulated tachymeter running on a minimal Linux machine. While both portions are freely available from the authors' Github shares, the exploit is currently subject to a Metasploit pull request.
翻译:主计长地区网络(CAN)是连接现代汽车各控制单位的最常见协议,其弱点是已知的,但我们认为它们尚未得到充分探讨 -- -- 尽管协议在设计上显然不安全,但仍有待彻底评估如何和在何种程度上被恶意利用。这份手稿描述了实现更大目标的早期步骤,即将CAN的各种笔试活动结合起来,并在一个既定的笔试环境中,如Metasploit框架,整体地进行这些活动。特别是,我们将看到如何建造一种破坏微小Linux机器模拟速测仪的开采。虽然这两部分都可以从作者的Github股份中自由获得,但目前开采活动需要Metasploit拉力请求。