This repository contains my implementation of the research paper Car-Hacking:Accessing-and-Exploiting-the-CAN-Bus-Protocol by Bryson R. Payne. The project involves hacking automobiles using CAN bus messages. CAN (Controller Area Network) Bus is widely used in modern vehicles, and understanding its vulnerabilities is critical for both cybersecurity professionals and automotive engineers.
Packet Sniffing: Guidance on capturing and analyzing CAN Bus traffic.
Replay Attacks: Instructions on sending recorded packets back to the bus.
Packet Injection: Tips for crafting custom packets and injecting them into the network.
Message Decoding: Information on interpreting common CAN Bus messages.
Reverse Engineering: Steps for identifying unknown message IDs.
Automation Techniques: Suggestions for automating repetitive tasks in CAN Bus analysis.
Tools: can-utils, socketcan
Clone the repository:
git clone https://github.com/awais922609/Can-Bus-Hacking.git cd Can-Bus-Hacking
Contributions are welcome! To contribute:
Fork the repository.
Create a new branch:
git checkout -b feature-name
Commit your changes:
git commit -m "Add new feature"
Push to your branch and create a Pull Request.
This project is for educational purposes only. Use it responsibly and ensure you have proper authorization before testing on any system.
This repository is licensed under the MIT License.
For questions or suggestions, feel free to reach out:
GitHub: awais922609
Email: awaissajid@cyberdude.com