Lo que aprenderás
Basics of ESP32 Board
Installation of ESP32 Board
MQTT Protocol Concepts
Working on Real Car and Receiving Wireless CAN-BUS Data
Reverse Engineering CAN Packets on ECU Model
Creating Wireless ESP32 Device 3.0 to Communicate with Real Vehicle
Creating Different Subscriber Devices
ECU Model Remote Attack
Welcome to the third and the final course on “Automobile Hacking and Security v3.0”. This is the continuation of our previous two courses “Automobile Hacking and Security v1.0 and v2.0”. It has been a long journey. We covered so many important topics in the previous two courses like CAN protocol, OBD2 protocols, ECU Models and many other things.
But this course is going to be very different because this is a fully researched base course. If you have taken our previous course you should know that CAN is a protocol used in almost all vehicles nowadays and it’s a wired base protocol but we are going to combine it with another protocol to make it wireless and receive wireless CAN data.
We are going to use an ESP32 board in this course, so first we will cover the basics of the ESP32 board which are required for this course. Then we will look at the MQTT protocol which is a very popular protocol in the IOT world. We are going to combine CAN protocol and MQTT to create our own device which will be a wireless device. And this device will be based on an ESP32 board. We will test this device on a real car to get CAN-BUS data wirelessly. Then we will also use the same device on the ECU Model to perform ECU Remote Based Attack. So this course is a cutting edge technology course which will help find vulnerabilities in modern day vehicles and also help in your thesis and research paper.
¿Para quién es este curso?
- For Cybersecurity Researchers
- Ethical Hackers
- Hobbyist and Learners
- Anyone passionate about Cyber Security, But! Can think out of the box!!!
- Anyone who is doing research on Automobile Security
- Anyone Writing Thesis or Research paper on Automobile Security.
Ver másVer menos