Тёмный
Block Harbor
Block Harbor
Block Harbor
Подписаться
Block Harbor (BH) was established in 2014 to build great solutions in automotive cybersecurity to keep mobility safe. We’re on a mission to build great solutions for automakers and automotive suppliers to keep mobility safe, focused on their business needs; a standardized and regulated landscape.
BH’s first projects were with Fiat Chrysler Automobiles (FCA) in the wake of the “Jeep Hack” that brought public attention to the need of cybersecurity in connected vehicles. BH is an industry leader in vehicle cybersecurity - everything from testing services as a part of our Vehicle Cybersecurity Labs to maintaining a 24/7/365 Vehicle Security Operation Center to monitor vehicle systems for attacks. BH has a firm understanding of the standard and regulatory landscape and how to implement vehicle cybersecurity at scale.
For vehicle focused penetration testing service to threat and risk analysis, BH has you covered.
ICSim: Unlock my door
3:29
День назад
CSMS: Our Approach to Gap Remediation
4:30
14 дней назад
ISO 21434 Template Package & CSMS
1:45
14 дней назад
Vehicle OSINT: Mac Track!
3:04
Месяц назад
Vehicle OSINT: Imported when?
2:04
Месяц назад
Getting Started: Arbitration
2:16
Месяц назад
Getting Started: Data field 2
1:28
Месяц назад
Vehicle OSINT: Manufactured at?
1:57
Месяц назад
Intro to CTF season 1
1:55
Месяц назад
Vehicle OSINT: Make and model
1:27
Месяц назад
OSINT: Founding Fathers
0:52
Месяц назад
Vehicle OSINT: Finding a VIN
1:20
Месяц назад
Getting Started: Data field 1
1:30
Месяц назад
ISO/SAE 21434 Overview
14:57
2 месяца назад
TMUX Quick Tip
0:38
Год назад
UDS - Understanding ISO-TP Frames
12:32
Год назад
Комментарии
@therealspixycat
@therealspixycat 11 дней назад
What do you use to decode the messages?
@MGsyd
@MGsyd 22 часа назад
You need the service manual or you can reverse engineer the can frames
@David-ci7qc
@David-ci7qc 20 дней назад
Its ISO/SAE 21434
@diegodonovan7195
@diegodonovan7195 Месяц назад
Is the CTF still open?
@EMPERUS99
@EMPERUS99 Месяц назад
Why is the 10th video private?
@ogexoreaper2052
@ogexoreaper2052 Месяц назад
Pcm hacking smart keys would be great
@Irfan_Shaikh71
@Irfan_Shaikh71 2 месяца назад
😊
@MD-de8go
@MD-de8go 2 месяца назад
Can you share the PPT
@redcloud4741
@redcloud4741 2 месяца назад
This is awesome, it works. Was so cool to see the traffic after turning the key. What a magical moment!
@GNXClone
@GNXClone 3 месяца назад
Ah this takes me back over 20 years. Hacking into access cards by glitching voltage and/or clock signal. Never used EMI though.
@bigboss-bv5wl
@bigboss-bv5wl 4 месяца назад
which one is the pount symbol
@redcloud4741
@redcloud4741 5 месяцев назад
so grateful that charles came all the way from space to give this talk. thanks
@juergenm6107
@juergenm6107 5 месяцев назад
Hi thanks for the nice video series about ISO 21434 TARA. One question, aren't the examples of product security goals too generic, especially the second one? The last available video is 9/10. Will there be another video part 10/10 from you?
@user-so8gd5vz5q
@user-so8gd5vz5q 6 месяцев назад
how can i contact you ? pls share your contact details thx
@user-so8gd5vz5q
@user-so8gd5vz5q 6 месяцев назад
hello how can i contact you ? thx
@blockharbor
@blockharbor 6 месяцев назад
You can reach us here on our website: blockharbor.io/contact-us
@artsie6146
@artsie6146 7 месяцев назад
tysm that was so informative
@blackxxxstar
@blackxxxstar 8 месяцев назад
Love More VSEC videos using kali
@asikuttan
@asikuttan 9 месяцев назад
This video is simple, but yet the best explanation on ISOTP. Thank you and keep up the good work :)
@user-fr6dz1dt7s
@user-fr6dz1dt7s 10 месяцев назад
How we can access this exercise?
@bennguyen1313
@bennguyen1313 10 месяцев назад
Any idea if CAN hardware (Ixxat USB-to-CAN V2, Peak PCAN-USB, etc) will work on a Linux VM running inside of a Windows Host? Or will the Windows driver have issues with passing data to Linux/SocketCAN?
@bjk365
@bjk365 11 месяцев назад
@SleipnirKang
@SleipnirKang 11 месяцев назад
I am getting myself familiar with UDS and isotp. This is the most practical and detailed video I've seen right now. I really appreciate.
@blockharbor
@blockharbor 11 месяцев назад
I'm glad you like it! If you want to get hands-on and take The Plunge, we have the Hackathon 101 course for free or the Vehicle Penetration Testing course at vsec.blockharbor.io
@cozt7050
@cozt7050 Год назад
Just discover you content this is cool asf. If you have more resource for car hacking or other stuff can you link them in this comment and thanks.
@lionelwade7824
@lionelwade7824 Год назад
promo sm 🙋
@JohnTurner313
@JohnTurner313 Год назад
Great info here, love the playlist. Thanks! 👍
@sshrek1996
@sshrek1996 Год назад
10:48 - In the first frame of the sequence the length of the data is 0x01B which is 27 in decimal, but the length of the VIN is 24-Bytes (33 46 4D 54 4B ...... 00 00 00 00 00). Can you help me with this?
@blockharbor
@blockharbor Год назад
While the length of the VIN is 24 bytes, the entire message is 27 bytes of data. The length of the response includes the "62 F1 90," indicating a positive response to a service 22 requesting the VIN.
@thechallenger3020
@thechallenger3020 11 месяцев назад
Always the length of the Response = Length of Data + Service ID + Sub Service ID + ID In the case: Length of Data = 24 Bytes Service ID = 1 Byte (0x22 + 0x40 = 0x62) Sub Service ID = 0 (No Sub Service ID in Read DID) ID = 2 Bytes (F1 90) Total = 27 Bytes
@tilojavideo
@tilojavideo Год назад
I cant make my control needle go up. Everything works except that.
@fenugrec5697
@fenugrec5697 Год назад
Interesting... any luck with undervolting and/or overclocking ? What cpu is that, MPC5556 ?
@blockharbor
@blockharbor Год назад
Its MPC5566, we did have success over JTAG password checks using voltage dropping glitches.
@roboto6375
@roboto6375 Год назад
Great series - What happened to the 10th video? haha
@roboto6375
@roboto6375 Год назад
Great video!
@ayodejifewa8292
@ayodejifewa8292 Год назад
Thanks soo much for this content.
@ayodejifewa8292
@ayodejifewa8292 Год назад
So glad I have discovered this page. I have about 4 years experience as an automotive controls engineer and I am also interested in cybersecurity. This page is the perfect confluence of interest I have been looking for.
@roboto6375
@roboto6375 Год назад
Just discovered this and so happy I did! Keep up the great videos
@richardstockwell4862
@richardstockwell4862 Год назад
Awesome stuff man wish there were more content like this.
@AliEl-Sharif
@AliEl-Sharif Год назад
Great tutorial. I found these instructions helpful for installing Kali Linux on an M1 Mac ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-9zdjQ9w_v_4.html
@miracaslantas2650
@miracaslantas2650 Год назад
It was a very useful video series. It would be great if it continues.
@BryanBlockHarbor
@BryanBlockHarbor Год назад
We are releasing more video content. Do you have an specific content you would like to see?
@eurowerx4267
@eurowerx4267 Год назад
Looks like a lot of work and some pricey equipment. Magic Motorsports $5500 master software package
@andrewkostin2215
@andrewkostin2215 Год назад
Thanks for creating and sharing the cool video. One comment - the goal you provide as an example (enforce least privilege…) is not actually a goal, it’s a requirement. And another problem of the example - achieving the goal doesn’t help as the attacker is still able to execute arbitrary code on the device which potentially means altering a vehicle function. Yes, the code is non-privileged but who cares. The asset in the example is a software and I would say the goal should be to ensure integrity of the software. To achieve the goal you potentially need to: - minimise attack surface - prevent scanning - check integrity of the software in runtime - monitor and fix known vulnerabilities - authenticate requests to the software - etc no worries, goals are one of the most annoying things in the story)
@youtubesucks376
@youtubesucks376 Год назад
Sweet! Now I can fuzz the bus without breaking my car!
@WenjuanLu
@WenjuanLu Год назад
Awesome, Jonathon taught me this exact list of commands when we were prototyping telematics to upload the entire powertrain CAN traffic for engineering analysis.
@youtubesucks376
@youtubesucks376 Год назад
Such informational, much wow
@wasashisanbaka123456
@wasashisanbaka123456 Год назад
If it's an EV, attack surface would also include the charging port itself. The FHWA's NEVI Plan NPRM defines OCPP as the predominant EV charging protocol to be used, where the OCPP documentation describes communication from EV charging station to car via the physical input to the vehicle.
@Chrisadynowski
@Chrisadynowski Год назад
please continue great tutorial :)