Analytics

6/27/2016
04:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Free 'CANSPY' Car-Hacking Tool On Tap

French researchers at Black Hat USA will release plug-in tool for testing vehicles for security vulnerabilities.

French researchers have built and soon will release a free homegrown tool that spots cybersecurity weaknesses in vehicles.

The concept for the so-called CANSPY auditing tool for cars evolved out of vulnerability assessment work that Jonathan-Christofer Demay and Arnaud Lebrun were doing for a major European carmaker, which they declined to identify. Demay and Lebrun in August will release the tool’s firmware as well as demonstrate CANSPY at Black Hat USA in Las Vegas.

Just like its name suggests, CANSPY is about testing for vulnerabilities in the vehicle’s Controller Area Network (CAN) bus, basically the car’s on-board, local communications network. While there are now a growing number of CAN bus tools available for vulnerability testing in cars, Demay says the difference with CANSPY is that it can intercept packets.

CANSPY is aimed at security researchers or security auditors, and requires physical access to a vehicle: it doesn’t perform remote hacks. “We’re on the CAN side. What and if a CAN device is compromised, can it compromise other devices,” he says. CANSPY sits between those devices and performs a “man-in-the-middle” traffic capture and analysis, he says.

CANSPY can be configured with rules to stop, drop, or modify, malicious or suspicious traffic on the CAN bus, he says. It sits on the CAN bus, and is connected via the vehicle On Board Diagnostics (OBD) II port.

“You can craft any type of attacks as long as you know how, [and] you can exploit any vulnerability that can be triggered over the CAN bus if you can get knowledge of its existence, and CANSPY will make you more efficient at doing all this,” says Demay, who is the penetration testing lead for Airbus Defence and Space. Lebrun is command and control engineer for Airbus.

Demay says CANSPY could also be converted to an intrusion prevention system (IPS)-type tool for a vehicle.  “You can very easily turn into into an IPS, actually,” he says. “But you would need to write the rules” for  dropping packets with certain characteristics, for instance, he says.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Demay and Lebrun in their “CANSPY: A Platform For Auditing Can Devices” Black Hat session will conduct a demo that emulates electronic control units (ECUs) in the vehicle; they won’t be using an actual vehicle, but a tool simulating the car network, to show CANSPY in action.

Their hope is that other car hackers will want to test-drive CANSPY. Their next step is creating more auditing scripts, and they’re looking for input from other researchers.

“It’s mostly made of cheap … off-the-shelf [hardware] so it will be easy to buy and build for everyone,” he says. The researchers’ tool is built on STMicroelectronics’ 32-bit ARM Cortex MCU.

Meanwhile, here’s a fun fact: CAN bus isn’t just for cars.  “Some ground systems use PLCs and you can use the CAN bus to set up communications between them,” he says. It’s also used within satellites, he says, all mainly due to its reliability.

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
asintsov
50%
50%
asintsov,
User Rank: Apprentice
7/1/2016 | 5:15:48 AM
CANToolz
More good tools! Regarding CAN games there is another open-source framework: https://github.com/eik00d/CANToolz Same ideas and already public: differnet modules, multynterface support (for mitm), smart trafic analysis, you can build car emulator, IPS, UDS scaner, fuzzer and a lot of things, WEB API and more.... 
Not a commercial, since tool is free. Just want to share 8)

WEB GUI
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 1:02:39 PM
Re: Securing transmission
Definitely! The more layers that can be applied the better. However, proper testing needs to occur to ensure that these measures are not a major hindrance to the genuine user experience.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 12:37:51 PM
Re: Expansion
I agree with you. When the CBA shows that the cost of security implementation is less than the the cost of the risk imposed then manufacturing will put a heavier emphasis on security.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 12:36:06 PM
Re: Expansion
I would venture to say that detection of physical use for a car is a bit more apparent then a laptop.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:49:47 AM
Securing transmission
Securing transmission is not the major problem but when somebody access the car and plays with electronics of system that would be something like somebody has your laptop, so additional layers of security is needed.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:49:08 AM
Re: Expansion
"...  infamous Jeep hack ..."

It makes sense. Obviously Jeep was just a sample. Most likely no car is secure today. Cost-benefit analysis will determine when car manufactures will start investing security too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:46:53 AM
Re: Expansion
" ... drop malicious packets ..."

It would need to block one way other so it is dropping packets for sure.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:45:14 AM
Re: Expansion
"... it's a plug-in device ..."

Agree. It is good to start somewhere, we will see what else needed along the way.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:43:58 AM
Re: Expansion
"... physical access to the vehicle ..."

Good questions. This would be like somebody having access to your laptop. What would they do?  :--))

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:42:35 AM
5G
Now that 5G is coming, at least, the communications between the vehicles and cloud would be secured. 
Page 1 / 2   >   >>
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.