Slides Here: /redirect?v=tVLatTmNI38&redir_token=k5AoTc7AXGiRJ5YCV-6DRSR_8I98MTUzNzM5OTc3MEAxNTM3MzEzMzcw&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSuch%2FDEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf
Playing with Car Firmware or How to Brick your Car
Paul Such 0x222 FOUNDER OF SCRT
A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be something really fun :) How to access the firmware, hidden menus & functionalities, hardcoded SSID, users and passwords (yes, you read right), are some of the subjects we will cover during this short presentation.
Paul Such 0x222 is a security engineer and the founder of SCRT, a Swiss company specialized in ethical hacking / penetration test and digital forensic since 2002. He is also the organizer of the Insomni'hack event (CTF and security conference in Switzerland)
Florian Gaultier (Agix) is a security enthusiast working for SCRT France since 2012. He is also the founder of StHack security conference in Bordeaux (FRANCE) and member of w3stormz CTF team. Loving reverse engineering he was happy to work on this project.