From the course: Ethical Hacking: Session Hijacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Going physical: Hijacking cars and drones

Going physical: Hijacking cars and drones - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Going physical: Hijacking cars and drones

- [Voiceover] Session hijacking isn't just confined to the realms of web applications. It can be used in the real world to take control of vehicles, such as cars and drones. There's been a lot of media coverage of some of these attacks, and we'll finish this course with a brief look at how this kind of attack works. Modern cars have multiple networks and dozens of sensors and electronic computer units, ECUs. Replacing early point to point wiring with addressable network devices. The CAN BUS network is commonly used for vehicle controls and the MOS network for entertainment systems. Many vehicles are now also including an ethernet network with IP addressable components. This is an example of a vehicle wiring diagram. While access to these networks and computers is normally through a physical connector inside the car, typically what is known as an OBD2 port, it's also possible to connect using Bluetooth, Wi-Fi, and increasingly, remote access via the internet from PC and mobile phone…

Contents