Session
Hands-on Hacking Automotive Systems
As modern vehicles evolve into complex networks of software and hardware, they become increasingly susceptible to cyber threats. In this hands-on workshop, we will explore how vulnerabilities in automotive systems can be identified, analyzed, and demonstrated. Participants will dive into real-world scenarios using practical tools and techniques to penetrate vehicle networks, uncover security flaws, and experiment with live attacks. This workshop bridges the gap between theoretical knowledge and practical skills, empowering attendees to better understand the increasingly connected automotive landscape.
The session will begin with an introduction to automotive security concepts and the architecture of modern vehicle networks. Participants will then learn how to interact directly with the Controller Area Network (CAN) bus, the central communication system in most vehicles. Through guided, hands-on exercises, they will reverse engineer messages to the instrument cluster and send spoofed signals to manipulate displayed information.
Format: Highly interactive, featuring live demonstrations, step-by-step technical exercises, and collaborative discussions.
Key takeaways:
- Understand the fundamentals of modern automotive security and vehicle network architecture
- Gain practical skills in interacting with and analyzing CAN bus traffic
- Learn to reverse engineer communication to critical vehicle components
- Experiment with sending spoofed messages in a safe, controlled environment

Roald Nefs
Chief Technology Officer at Warpnet
Groningen, The Netherlands
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top