Abstract
This talk will show the physical security of charging points with their weaknesses, and vulnerabilities in the OCPP protocol, show how the security of charging cards is working, and finally, how a vulnerability in the operating system of the Charging stations allows you to make doublets of charging cards.
Furthermore, the release of 3 different vulnerabilities of one charging station is shown, allowing to compromise customers using this station type. There are many more vulnerabilities, for example, one that reboots a charging station with a crafted network packet. All needed is a minute unobserved access to a charging point or.... but that will be discussed in the Talk. What has to be done to secure it? This is covered in the last topic of the Talk.
#OCPPProtocol #PhysicalSecurity #Vulnerabilities #cybersecurity
Know more - nullcon.net/be...
----------------
Follow Nullcon on Facebook: / nullcon
X: / nullcon
LinkedIn: / posts
Website: nullcon.net/
1 окт 2024