YoVDO

Car Hacking Explained for Bug Hunters - Automotive Security Vulnerabilities and Methodologies

Offered By: Bugcrowd via YouTube

Tags

Automotive Security Courses Bug Bounty Courses Hardware Security Courses Web Application Security Courses API Security Courses IoT security Courses Vulnerability Assessment Courses Mobile Security Courses Car Hacking Courses

Course Description

Overview

Explore the fascinating realm of automotive security in this 37-minute conference talk by Jay Turla, a Manager of Security Operations at Bugcrowd. Delve into common automotive security vulnerabilities, learn about proof-of-concept attacks, and understand how to prioritize and rate bugs from a Bug Bounty perspective. Gain insights into car hacking methodologies, ranging from IoT security to CAN bus hacking, and discover that automotive security extends beyond traditional areas to include web apps, APIs, hardware, and mobile applications. Acquire knowledge about essential car hacking tools, prerequisites, and resources, including virtual machines and Metasploit. Get inspired to pursue car hacking and automotive security, as you never know when you might be invited to participate in a car bug bash.

Syllabus

Intro
Background Noise
Who am I
Hacking Village
Why Car Hacking
Sample Screenshot
Car Hacking Handbook
Combat Attack Surfaces
Attack Surface Graph
Bugcrowd Categories
Infotainment Crash
Infotainment VRT
Infotainment P3
Advanced Scan Injection Attacks
Car Hacking Tool
Prerequisites
Resources
VM Machine
Metasploit
NanoCan


Taught by

Bugcrowd

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam