Greetings and welcome to May! In this episode of ATP, I’m going to cover everything that I would consider to be required information about OBD2 to enable you to start poking around at the innards of your car’s data bus. We’ll do a brief history about why it exists at all, talk about the assorted busses and pinout of that oh-so-famous connector, cover the command structure, present examples, and wrap up with an evaluation of how you might want to proceed (including some gear choices) and point you towards more info to take you further.
Stuff you should
Charlie Miller and Chris Valasek’s site all about car hacking (
On-Board Diagnostics (
OBD2 PID’s (
ISO 15765-2 (
Gear that I talk
Analog Discovery 2 (
SparkFun OBD2 UART (
OBD2-DB9 Cable (
FTDI Basic 3.3V Breakout (
SparkFun AST-CAN485 Dev Board (
OBD2 Connector (
Docker isn’t going away any time soon. It’s not too late to hop on the bandwagon and learn what the fuss is all about. Enjoy a talk with Chris Dale on how to leverage Docker, and specifically utilize it for doing security testing.
SANS instructor Chris Dale teaches SANS Hacker Tools, Techniques, Exploits, and Incident Handling. As head of the penetration testing and incident handling groups at Netsecurity, a company based in Norway, Chris brings significant security expertise and a background in system development, IT operations and security management. He is passionate about security, and he regularly gives presentations and teaches at conferences and workshops. Chris holds the GCIH, GPEN, GSLC and GMOB certifications and participates in panel debates and government-related working groups to recommend and improve security in the Norwegian private and public sectors.