Connecting Hardware to Your Real Car:
I realized the other day I posted Part 2 of this series to my youtube awhile ago but not blogger so this one will be quick and mostly via video walkthrough. I often post random followup videos which may never arrive on this blog. So if you're waiting on something specific I mentioned or the next part to a series its always a good idea to subscribe to the YouTube. This is almost always true if there is video associated with the post.
In the last blog we went over using virtual CAN devices to interact with a virtual car simulators of a CAN network This was awesome because it allowed us to learn how to interact with he underlying CAN network without fear of hacking around on an expensive automobile. But now it's time to put on your big boy pants and create a real CAN interface with hardware and plug your hardware device into your ODB2 port.
The video I created below will show you where to plug your device in, how to configure it and how to take the information you learned while hacking around on the virtual car from part1 and apply it directly to a real car.
Video Walk Through Using Hardware on a Real Car
As a reference here are the two device options I used in the video and the needed cable:
Hardware Used:
Get OBD2 Cable:
https://amzn.to/2QSmtyL
Get CANtact:
https://amzn.to/2xCqhMt
Get USB2CAN:
https://shop.8devices.com/usb2can
https://amzn.to/2QSmtyL
Get CANtact:
https://amzn.to/2xCqhMt
Get USB2CAN:
https://shop.8devices.com/usb2can
Creating Network Interfaces:
As a reference here are the commands from the video for creating a CAN network interface:
USB2Can Setup:
The following command will bring up your can interface and you should see the device light color change:
sudo ip link set can0 up type can bitrate 125000
Contact Setup:
Set your jumpers on 3,5 and 7 as seen in the picture in the video
Sudo slcand -o -s6 /dev/ttyACM can0 <— whatever device you see in your DMESG output
Ifconfig can0 up
Summary:
That should get you started connecting to physical cars and hacking around. I was also doing a bit of python coding over these interfaces to perform actions and sniff traffic. I might post that if anyone is interested. Mostly I have been hacking around on blockchain stuff and creating full course content recently so keep a look out for that in the future.
Related articles
- Hacking Tools For Games
- Kik Hack Tools
- Hack Rom Tools
- Hacker Tools 2019
- Hacker Tools Software
- Hacking Tools And Software
- Easy Hack Tools
- Hack App
- Hacking Tools For Pc
- Hacking Tools 2020
- Best Pentesting Tools 2018
- Hacking Tools Software
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Pentest Tools Apk
- Pentest Tools Port Scanner
- Hack Tools For Games
- Blackhat Hacker Tools
- Hacking Tools For Windows
- Ethical Hacker Tools
- Hacks And Tools
- Pentest Tools Github
- Hacker Tools 2019
- Hacking Tools For Windows Free Download
- Best Hacking Tools 2020
- Pentest Tools Github
- Hacker Tools Software
- Pentest Tools For Windows
- Game Hacking
- Hack Rom Tools
- Hack Tools Mac
- Android Hack Tools Github
- Hacking Tools Hardware
- Hack Tools Online
- Beginner Hacker Tools
- Easy Hack Tools
- Pentest Tools For Ubuntu
- Computer Hacker
- Easy Hack Tools
- Hacker Tools Free
- Hacker Tools Windows
- Ethical Hacker Tools
- Hacker
- Hacker Tools For Ios
- Hacker
- Beginner Hacker Tools
- Pentest Tools Nmap
- World No 1 Hacker Software
- Blackhat Hacker Tools
- Hacking Tools Github
- Pentest Tools Android
- Hacker Tools Github
- Hacker
- Hack Tools
- Hack And Tools
- How To Hack
- Pentest Tools For Mac
- Pentest Tools Subdomain
- Game Hacking
- Hacking Tools
- Beginner Hacker Tools
- Best Hacking Tools 2020
- New Hack Tools
- Hacking Tools And Software
- Blackhat Hacker Tools
- Hacking Apps
- Usb Pentest Tools
- Hack Tools Online
- Pentest Tools Bluekeep
- Hack Tools
- Hackers Toolbox
- Pentest Tools Apk
- Hacker Tools Github
- Pentest Tools Website Vulnerability
- Pentest Tools Url Fuzzer
No comments:
Post a Comment