Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Remote Exploitation of Nissan Leaf - Controlling Critical Body Elements from the Internet

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive security research presentation that demonstrates the remote compromise of a 2020 Nissan Leaf electric vehicle, revealing critical vulnerabilities in modern connected automotive systems. Learn how security researchers successfully exploited Bluetooth weaknesses to infiltrate the vehicle's internal network, bypassed secure boot processes to escalate access privileges, and established a covert Command and Control channel over DNS for persistent remote communication. Discover the technical methodology behind compromising an independent communication CPU to interface directly with the CAN bus, enabling control over critical body functions including mirrors, wipers, door locks, and steering systems. Gain insights into each stage of the exploitation process, from initial network access and command execution to bypassing gateway security filters, while understanding the serious safety implications of these vulnerabilities. Examine the urgent need for enhanced cybersecurity protections in connected vehicles as automotive technology continues to evolve with expanding digital connectivity features like onboard Wi-Fi, Bluetooth, and USB systems, making this research essential for advancing vehicle cybersecurity standards and protecting against remote exploitation threats.

Syllabus

Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet

Taught by

Black Hat

Reviews

Start your review of Remote Exploitation of Nissan Leaf - Controlling Critical Body Elements from the Internet

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.