Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/27/2016
04:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Free 'CANSPY' Car-Hacking Tool On Tap

French researchers at Black Hat USA will release plug-in tool for testing vehicles for security vulnerabilities.

French researchers have built and soon will release a free homegrown tool that spots cybersecurity weaknesses in vehicles.

The concept for the so-called CANSPY auditing tool for cars evolved out of vulnerability assessment work that Jonathan-Christofer Demay and Arnaud Lebrun were doing for a major European carmaker, which they declined to identify. Demay and Lebrun in August will release the tool’s firmware as well as demonstrate CANSPY at Black Hat USA in Las Vegas.

Just like its name suggests, CANSPY is about testing for vulnerabilities in the vehicle’s Controller Area Network (CAN) bus, basically the car’s on-board, local communications network. While there are now a growing number of CAN bus tools available for vulnerability testing in cars, Demay says the difference with CANSPY is that it can intercept packets.

CANSPY is aimed at security researchers or security auditors, and requires physical access to a vehicle: it doesn’t perform remote hacks. “We’re on the CAN side. What and if a CAN device is compromised, can it compromise other devices,” he says. CANSPY sits between those devices and performs a “man-in-the-middle” traffic capture and analysis, he says.

CANSPY can be configured with rules to stop, drop, or modify, malicious or suspicious traffic on the CAN bus, he says. It sits on the CAN bus, and is connected via the vehicle On Board Diagnostics (OBD) II port.

“You can craft any type of attacks as long as you know how, [and] you can exploit any vulnerability that can be triggered over the CAN bus if you can get knowledge of its existence, and CANSPY will make you more efficient at doing all this,” says Demay, who is the penetration testing lead for Airbus Defence and Space. Lebrun is command and control engineer for Airbus.

Demay says CANSPY could also be converted to an intrusion prevention system (IPS)-type tool for a vehicle.  “You can very easily turn into into an IPS, actually,” he says. “But you would need to write the rules” for  dropping packets with certain characteristics, for instance, he says.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Demay and Lebrun in their “CANSPY: A Platform For Auditing Can Devices” Black Hat session will conduct a demo that emulates electronic control units (ECUs) in the vehicle; they won’t be using an actual vehicle, but a tool simulating the car network, to show CANSPY in action.

Their hope is that other car hackers will want to test-drive CANSPY. Their next step is creating more auditing scripts, and they’re looking for input from other researchers.

“It’s mostly made of cheap … off-the-shelf [hardware] so it will be easy to buy and build for everyone,” he says. The researchers’ tool is built on STMicroelectronics’ 32-bit ARM Cortex MCU.

Meanwhile, here’s a fun fact: CAN bus isn’t just for cars.  “Some ground systems use PLCs and you can use the CAN bus to set up communications between them,” he says. It’s also used within satellites, he says, all mainly due to its reliability.

Related Content:

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
asintsov
50%
50%
asintsov,
User Rank: Apprentice
7/1/2016 | 5:15:48 AM
CANToolz
More good tools! Regarding CAN games there is another open-source framework: https://github.com/eik00d/CANToolz Same ideas and already public: differnet modules, multynterface support (for mitm), smart trafic analysis, you can build car emulator, IPS, UDS scaner, fuzzer and a lot of things, WEB API and more.... 
Not a commercial, since tool is free. Just want to share 8)

WEB GUI
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 1:02:39 PM
Re: Securing transmission
Definitely! The more layers that can be applied the better. However, proper testing needs to occur to ensure that these measures are not a major hindrance to the genuine user experience.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 12:37:51 PM
Re: Expansion
I agree with you. When the CBA shows that the cost of security implementation is less than the the cost of the risk imposed then manufacturing will put a heavier emphasis on security.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 12:36:06 PM
Re: Expansion
I would venture to say that detection of physical use for a car is a bit more apparent then a laptop.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:49:47 AM
Securing transmission
Securing transmission is not the major problem but when somebody access the car and plays with electronics of system that would be something like somebody has your laptop, so additional layers of security is needed.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:49:08 AM
Re: Expansion
"...  infamous Jeep hack ..."

It makes sense. Obviously Jeep was just a sample. Most likely no car is secure today. Cost-benefit analysis will determine when car manufactures will start investing security too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:46:53 AM
Re: Expansion
" ... drop malicious packets ..."

It would need to block one way other so it is dropping packets for sure.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:45:14 AM
Re: Expansion
"... it's a plug-in device ..."

Agree. It is good to start somewhere, we will see what else needed along the way.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:43:58 AM
Re: Expansion
"... physical access to the vehicle ..."

Good questions. This would be like somebody having access to your laptop. What would they do?  :--))

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 10:42:35 AM
5G
Now that 5G is coming, at least, the communications between the vehicles and cloud would be secured. 
Page 1 / 2   >   >>
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-8087
PUBLISHED: 2019-10-22
Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.
CVE-2019-10079
PUBLISHED: 2019-10-22
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
CVE-2019-12147
PUBLISHED: 2019-10-22
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the...
CVE-2019-12148
PUBLISHED: 2019-10-22
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin ...
CVE-2019-12290
PUBLISHED: 2019-10-22
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusi...