Connecting Hardware to Your Real Car:
I realized the other day I posted Part 2 of this series to my youtube awhile ago but not blogger so this one will be quick and mostly via video walkthrough. I often post random followup videos which may never arrive on this blog. So if you're waiting on something specific I mentioned or the next part to a series its always a good idea to subscribe to the YouTube. This is almost always true if there is video associated with the post.
In the last blog we went over using virtual CAN devices to interact with a virtual car simulators of a CAN network This was awesome because it allowed us to learn how to interact with he underlying CAN network without fear of hacking around on an expensive automobile. But now it's time to put on your big boy pants and create a real CAN interface with hardware and plug your hardware device into your ODB2 port.
The video I created below will show you where to plug your device in, how to configure it and how to take the information you learned while hacking around on the virtual car from part1 and apply it directly to a real car.
Video Walk Through Using Hardware on a Real Car
As a reference here are the two device options I used in the video and the needed cable:
Hardware Used:
Get OBD2 Cable:
https://amzn.to/2QSmtyL
Get CANtact:
https://amzn.to/2xCqhMt
Get USB2CAN:
https://shop.8devices.com/usb2can
https://amzn.to/2QSmtyL
Get CANtact:
https://amzn.to/2xCqhMt
Get USB2CAN:
https://shop.8devices.com/usb2can
Creating Network Interfaces:
As a reference here are the commands from the video for creating a CAN network interface:
USB2Can Setup:
The following command will bring up your can interface and you should see the device light color change:
sudo ip link set can0 up type can bitrate 125000
Contact Setup:
Set your jumpers on 3,5 and 7 as seen in the picture in the video
Sudo slcand -o -s6 /dev/ttyACM can0 <— whatever device you see in your DMESG output
Ifconfig can0 up
Summary:
That should get you started connecting to physical cars and hacking around. I was also doing a bit of python coding over these interfaces to perform actions and sniff traffic. I might post that if anyone is interested. Mostly I have been hacking around on blockchain stuff and creating full course content recently so keep a look out for that in the future.
Read more
- Top Pentest Tools
- Hack Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Url Fuzzer
- Hacker Tools 2020
- Hacker Tools Online
- Pentest Tools For Mac
- Hack App
- Wifi Hacker Tools For Windows
- Hack Tools For Games
- Hack Tools Github
- Ethical Hacker Tools
- Hacking Apps
- Hackers Toolbox
- Hacker Tools Apk
- New Hacker Tools
- Best Hacking Tools 2020
- What Are Hacking Tools
- Tools 4 Hack
- Hack Tools For Windows
- Hacker Tools For Pc
- Hacking Tools Software
- What Are Hacking Tools
- Hack And Tools
- Hack Tools Download
- Pentest Tools Bluekeep
- Pentest Tools Free
- Nsa Hacker Tools
- Nsa Hacker Tools
- Free Pentest Tools For Windows
- Hack Apps
- Hacker Tools Apk Download
- Hacker Tools Apk
- Hack Tools Pc
- Hacking Tools For Windows 7
- Hacker Tools Hardware
- Hacker Tools For Windows
- Pentest Tools Github
- Hackrf Tools
- Pentest Tools For Android
- Hacking Tools For Pc
- Hacking Tools For Mac
- Hacker Tools Linux
- Hacker Hardware Tools
- Hacking Tools Mac
- Pentest Tools
- Kik Hack Tools
- Pentest Tools Linux
- Hacking Tools For Mac
- Best Pentesting Tools 2018
- Underground Hacker Sites
- Underground Hacker Sites
- Hacking Tools Github
- Hacking Tools And Software
- Underground Hacker Sites
- Pentest Tools Github
- Hack Tools Download
- Hacker Tools For Ios
- Hack Tools For Mac
- Hak5 Tools
- Hack Tool Apk No Root
- Hack Tool Apk
- Hack Tools Online
- Pentest Tools Website Vulnerability
- Hacker Tools Online
- Pentest Tools Download
- Hack App
- Pentest Tools Port Scanner
- Hacker Security Tools
- Hacking Tools Windows 10
- Hacker Tools For Ios
- Pentest Tools Download
- Nsa Hack Tools Download
- Hacker Hardware Tools
- Free Pentest Tools For Windows
- Pentest Reporting Tools
- Pentest Tools List
- Pentest Tools Nmap
No comments:
Post a Comment