ROOTCON 17 will be on September 27, 28 & 29, 2023 at Taal Vista Hotel in Tagaytay.
Car Hacking Village
Automotive Security and Car Hacking have been the focus for years now. More talks and
research are geared towards it because it is the trend and we owe it to the Car Hacking Village
and of course to Charlie Miller and Chris Valasek. They are our inspiration to promote security
awareness that cars are hackable too. Cars have computers and technologies that hackers can
tap into: wireless, key fobs, CAN Bus, telematics, electronic controllers, ECUs, secure gateways
and the infotainment systems.
In order to not have copyright and trademark issues with the Car Hacking Village which debuted
at DEFCON 23 and was co-founded by Robert Leale aka carfucar, we contacted them through
the advise of Ian Tabor aka mintynet who is also one of my fellow car hackers. And you know
what, they allowed us to use their logo and supported us in our initiative since ROOTCON 13.
We owe it to them and like I said they are our inspiration.
So fellow ROOTCON goers, expect some good hardware and some junks that came out of
nowhere because we promise we are gonna showcase something new again today. Finally, we
are showcasing one vehicle this year \m/
Operator
shipcod3
Eman0n
Shawn
Div0's Car Security Quarter (CSQ)
Tools Exhibit
- One Vehicle for PoC
- Two Instrument Clusters (Standalone)
- One Infotainment System (Standalone)
- One Automotive Firewall
- Div0's Car Security Quarter (CSQ) Test Benches (pending if they can come through call for sponsorship)
- CAN sniffers
- nano-can
- RF Tools (Flipper Zero and HackRF)
- and many more…
Activities
- CAN Injection PoC
- RF Hacking PoC
- Fuzzing
- Test Bench Demo
- Android Auto Hacking PoC
- Giving out of nano-can PCBs
- Possible Bug Bash
Cellular Assault Village
The Cellular Assault Village focuses on one of the most critical areas of information security - attacking cellular communications. Our primary goal is to raise awareness and educate attendees about the risks associated with unsecured cellular networks. We offer a range of equipment, tools, and demonstrations that showcase different types of attacks and vulnerabilities related to cellular networks, providing an immersive experience for attendees to learn about the techniques and tools used by cyber attackers to infiltrate and exploit cellular communications. Our aim is to equip attendees with knowledge on how these attacks are carried out.
Aside from educating attendees about scams involving mobile phones, such as sending malicious links or phishing messages, the Cellular Assault Village also addresses other potential threats. This includes demonstrations on SMS interception, call spoofing, and SMS spoofing, which are techniques used by cyber attackers to intercept or falsify communication on cellular networks. We believe it is crucial to raise awareness about these types of attacks, which can compromise sensitive data and put individuals at risk.
We showcase different types of equipment and tools to show how these attacks are carried out, allowing attendees to gain firsthand experience in how cyber attackers exploit cellular networks. By providing this immersive experience, our village ensures that attendees are well-equipped to handle the latest scams and techniques used by cyber attackers to target mobile users and secure their cellular networks
Operator
hncaga
Tools Exhibit
- SDRs (USRP, HackRF, etc)
- Small BTS
- Customized SMS and Call Interceptor (not to be used on an actual network :D)
- Cell tower sniffer (Composed of 8 Mobile phones)
Talks
TBA