Automotive penetration test
hardware testing
The advancing process of digitalization does not stop at the automotive world.
The increasing number of ECUs in automobiles, as well as the greater networking of vehicles (C2X), also increases the risk of unauthorized access and manipulation of safety-critical systems.
However, advanced knowledge can also make use of information transmitted via the CAN bus to manipulate a wide variety of vehicle functions or to use it for function enhancement. The in-depth networking of a wide range of control units in the vehicle enables pioneering features such as autonomous driving, cruise control systems or even improved navigation.
A clear and present threat
Testing focus:
- Testing according to ISO/SAE 21434 Automotive Cybersecurity Standard
- Bus Protocols
- CAN
- LIN
- Ethernet
- Reverse engineering of the CAN bus
- Packet Analysis
- Fuzzing
- Testing the connection of the CAN buses (bridges)
- Connection of Infotainment Unit to Engine Controlling Unit
- Infotainment system
- Attacks via the update system
- Check for known vulnerabilities
- Mobile app communication
- Interface testing
- ODB-II
- Bluetooth
- Keyless Go
- GPS
- WiFi
- Mobile connection
- Cameras
- Sensors
- ECUs and other embedded systems
- Check for known vulnerabilities
- Code Analysis
- Brute-Forcing with Power-Analysis
- Fault Injection
- Key tests
- Jamming
- Brute-Forcing
- Forward Prediction
- Vehicle-to-Vehicle and Vehicle-to-Infrastructure Communication
Procedure of the tests
During the initial meeting, we get to know you and your company better. In the second round of the meeting, we discuss the next steps together with all decision-makers. The methodology of penetration testing to be applied is determined.
Once the penetration test has identified possible attack vectors and determined their probability of occurrence and the extent of damage, we present the results to you in a final report.
This includes a management summary, a detailed description of the inherent risks, and a proof of concept so that you can track the vulnerabilities internally with your own IT experts.
At the heart of the documentation are the comprehensive recommendations for action, which you can use to carry out independent remediation of the weak points in a simple and comprehensible manner.
Independently of a free debriefing to clarify open questions or ambiguities, we are also happy to provide you with a confirmation of the successful execution of a penetration test upon request. You can use this as proof for customers and business partners.
The final report contains the following components:
- Project frame data (project name, contact person, test period, scope)
- Management summary
- Description of the approach and methods used
- Summary and assessment of the identified vulnerabilities with regard to their criminality (incl. naming of CVSS values and CVE entries) as well as technical proof of concept
- Detailed technical description of the identified vulnerabilities / inherent risks.
- Recommendation of measures to eliminate the vulnerability as well as listing of all vulnerabilities in tabular form (Excel).
Your contact
You can always reach us personally. Because loyalty based on partnership is far more important to us than short-term success.
Philipp Kalweit
Managing Partner
+49 40 285 301 257