Save 43% on 1 Year of Coursera Plus
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive security research presentation that demonstrates the remote compromise of a 2020 Nissan Leaf electric vehicle, revealing critical vulnerabilities in modern connected automotive systems. Learn how security researchers successfully exploited Bluetooth weaknesses to infiltrate the vehicle's internal network, bypassed secure boot processes to escalate access privileges, and established a covert Command and Control channel over DNS for persistent remote communication. Discover the technical methodology behind compromising an independent communication CPU to interface directly with the CAN bus, enabling control over critical body functions including mirrors, wipers, door locks, and steering systems. Gain insights into each stage of the exploitation process, from initial network access and command execution to bypassing gateway security filters, while understanding the serious safety implications of these vulnerabilities. Examine the urgent need for enhanced cybersecurity protections in connected vehicles as automotive technology continues to evolve with expanding digital connectivity features like onboard Wi-Fi, Bluetooth, and USB systems, making this research essential for advancing vehicle cybersecurity standards and protecting against remote exploitation threats.
Syllabus
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Taught by
Black Hat