Earn Your Business Degree, Tuition-Free, 100% Online!
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive security research presentation that demonstrates the remote compromise of a 2020 Nissan Leaf electric vehicle, revealing critical vulnerabilities in modern connected automotive systems. Learn how security researchers successfully exploited Bluetooth weaknesses to infiltrate the vehicle's internal network, bypassed secure boot processes to escalate access privileges, and established a covert Command and Control channel over DNS for persistent remote communication. Discover the technical methodology behind compromising an independent communication CPU to interface directly with the CAN bus, enabling control over critical body functions including mirrors, wipers, door locks, and steering systems. Gain insights into each stage of the exploitation process, from initial network access and command execution to bypassing gateway security filters, while understanding the serious safety implications of these vulnerabilities. Examine the urgent need for enhanced cybersecurity protections in connected vehicles as automotive technology continues to evolve with expanding digital connectivity features like onboard Wi-Fi, Bluetooth, and USB systems, making this research essential for advancing vehicle cybersecurity standards and protecting against remote exploitation threats.
Syllabus
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Taught by
Black Hat