From the course: Ethical Hacking: Session Hijacking
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Going physical: Hijacking cars and drones - Linux Tutorial
From the course: Ethical Hacking: Session Hijacking
Going physical: Hijacking cars and drones
- [Voiceover] Session hijacking isn't just confined to the realms of web applications. It can be used in the real world to take control of vehicles, such as cars and drones. There's been a lot of media coverage of some of these attacks, and we'll finish this course with a brief look at how this kind of attack works. Modern cars have multiple networks and dozens of sensors and electronic computer units, ECUs. Replacing early point to point wiring with addressable network devices. The CAN BUS network is commonly used for vehicle controls and the MOS network for entertainment systems. Many vehicles are now also including an ethernet network with IP addressable components. This is an example of a vehicle wiring diagram. While access to these networks and computers is normally through a physical connector inside the car, typically what is known as an OBD2 port, it's also possible to connect using Bluetooth, Wi-Fi, and increasingly, remote access via the internet from PC and mobile phone…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.