Friday, October 11, 2024
HomeExploitation Tools4CAN - Cisco Released New Open Source Security Tool to Find Security...

4CAN – Cisco Released New Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

Published on

Malware protection

Cisco released an open-source hardware tool called “4CAN” for automobile security researchers and car manufacturers to find the potential security vulnerabilities in connected cars to ensure vehicle security.

Automobile systems such as cars integrated with hundreds of sensors and control systems that connected with computers and communicate with software systems in order to provide various features to the driver.

Vulnerabilities in these systems and the software that controls the car will cause serious threats in modern cars even it allows hackers to remote control of the vehicle.

- Advertisement - SIEM as a Service

New hardware security tool 4CAN let security researchers perform a variety of security assessments in components that connected with the vehicle such as Wi-Fi, Bluetooth, and cellular communication protocol, Controller Area Network (CAN)also called as CAN bus.”

If hackers physically access to the CAN bus via an ODB2 connector that fixed on the driver-side lower dash easily take complete control of the vehicle.

CAN bus communicate with various critical components including airbags and brakes and other non-critical components such as radio or interior lights.

By accessing the CAN bus, penetration testers and researchers can test the separate component to find the vulnerabilities.

4CAN

George Tarnovsky, a member of Cisco’s  Customer Experience Assessment & Penetration Team (CX APT) designed the 4CAN with the various perspective of analysing the vulnerabilities and following goals.

1. Validating communication policy for intra-CAN bus communication.
2. Fuzzing (sending randomized payloads) to components to identify vulnerabilities.
3. Exploring the CAN commands used to control/interact with the vehicle.
4. Simplify our testbench set up to keep everything organized and in sync.

Before 4CAN arrives, There are three CAN devices required to simultaneously test four CAN buses.  

“Along with that Two TT3201 three-channel CAN Capes attached to Beaglebones, and one CanBerryDual attached to a Raspberry Pi. also another Raspberry Pi to remotely control the test vehicle.”

With this configuration, we can test sending CAN frames between any two combinations of CAN channels but the testing process is very difficult which required to set up a lot of wires making the connection.

4CAN
Credits: CISCO

According to Cisco, “Using 4CAN, the test bench setup is vastly simplified. With a single Raspberry Pi, we can simultaneously test four CAN channel, and since the 4CAN exposes the entire 40-pin GPIO header, we can remotely control the test vehicle.”

4CAN
4CAN setup (Credits: CISCO)

4CAN allow the researchers to test the vulnerabilities including sniff CAN traffic, send CAN messages, replay captured CAN traffic, implement a CAN gateway to facilitate CAN-in-the-middle and other tests.

You can down download the 4CAN from GitHub.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors...

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security's highly regarded Debian-based distribution...

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools...