conf.directory

DEF CON 32 - Inside Dash Cam Custom Protocols and Discovered 0days - Hyo Jin Lee & Hanryeol Park

About this talk

In recent years, the use of dash cams has surged, making them an essential component of modern vehicles. To enhance user convenience, many dash cams are now equipped with network connectivity. This growth in the dash cam market has heightened the importance of vehicle and personal data security. However, network-connected dash cams pose potential security risks to their availability and key functionalities. In this presentation, we will comprehensively analyze dash cams from various countries, including South Korea, the USA, Germany, and China, as well as built-in dash cams. During our analysis, we discovered numerous zero-day vulnerabilities (such as OS Command Injection, Logical Bugs, and insufficient authentication) that pose significant security threats. Vulnerabilities were primarily found during the dash cam boot process, configuration changes, and communications via custom protocols. We will detail the dash cam analysis process in the following sequence: [Analysis Process] Acquiring firmware through official websites or apps Extracting the file system to analyze the initial boot logic Analyzing the boot logic to identify vulnerabilities or debugging ports to gain shell access Utilizing the obtained shell for remote debugging of the main system Interestingly, our analysis of 10 different dash cams revealed that 4 devices used the same OEM board from a common manufacturer. These 4 devices shared similar vulnerabilities, and exploiting a vulnerability found in one device allowed us to successfully exploit all of them. Our research uncovered common security vulnerabilities across multiple dash cams, and we will discuss measures to prevent these vulnerabilities. We will particularly focus on analyzing the custom protocols used by dash cams and the security risks associated with them. This presentation aims to raise awareness of potential security threats in dash cams and encourage manufacturers to produce more secure products. We hope to drive industry standards and best practices to ensure the safety and security of these increasingly critical devices. By sharing our findings, we aim to highlight the importance of dash cam security and provide insights that can lead to more secure designs and implementations.

Stay Updated

Get notified about new features and conference additions.

DEF CON 32 - Inside Dash Cam Custom Protocols and Discovered 0days - Hyo Jin Lee & Hanryeol Park by Hyo Jin Lee & Hanryeol Park | conf.directory | conf.directory