Willem Melching (@pd0wm) 's Twitter Profile
Willem Melching

@pd0wm

I take things apart. Sometimes I put them back together. Consulting & Trainings: icanhack.nl

ID: 48720751

linkhttp://icanhack.nl calendar_today19-06-2009 14:34:15

131 Tweet

2,2K Takipçi

605 Takip Edilen

Willem Melching (@pd0wm) 's Twitter Profile Photo

Second day of the training! Today we will be covering more diagnostic protocols and hardware hacking. Lots of actual vehicle hardware to practice on.

Second day of the training! Today we will be covering more diagnostic protocols and hardware hacking. Lots of actual vehicle hardware to practice on.
Willem Melching (@pd0wm) 's Twitter Profile Photo

Had blast giving my "Practical Car Hacking" training with participants from Deloitte and RDW! Three days filled with hands-on hacking on real vehicle hardware. If you're interested in attending one of my trainings or organize one, check out my website icanhack.nl.

Had blast giving my "Practical Car Hacking" training with participants from Deloitte and RDW! Three days filled with hands-on hacking on real vehicle hardware.

If you're interested in attending one of my trainings or organize one, check out my website icanhack.nl.
Willem Melching (@pd0wm) 's Twitter Profile Photo

I'm releasing the "automotive" rust crate! It has a fully async CAN adapter and UDS client. This allows building fast scanners or communicating with multiple ECUs in parallel. Both SocketCAN (Linux) and panda (Linux, MacOS, Windows) are supported. github.com/I-CAN-hack/aut…

I'm releasing the "automotive" rust crate! It has a fully  async CAN adapter and UDS client. This allows building fast scanners or communicating with multiple ECUs in parallel. Both SocketCAN (Linux) and panda (Linux, MacOS, Windows) are supported. 

github.com/I-CAN-hack/aut…
Willem Melching (@pd0wm) 's Twitter Profile Photo

New blog post is out! Extracting the SecOC keys used for securing the CAN Bus on the 2021+ RAV4 Prime. icanhack.nl/blog/secoc-key… Research started all the way in 2022, but took many evenings of reverse engineering to get code execution. PoC: github.com/I-CAN-hack/sec…

New blog post is out! Extracting the SecOC keys used for securing the CAN Bus on the 2021+ RAV4 Prime. icanhack.nl/blog/secoc-key…

Research started all the way in 2022, but took many evenings of reverse engineering to get code execution. 

PoC: github.com/I-CAN-hack/sec…
Lennert (@lennertwo) 's Twitter Profile Photo

In 2022 we found vulnerabilities in dormakaba Saflok hotel locks. Reading one RFID card enables us to forge a pair of cards that open any door in that hotel! Dormakaba is currently working with its customers to fix the 3 million affected locks. wired.com/story/saflok-h…

quarkslab (@quarkslab) 's Twitter Profile Photo

Fast and Curious: Emulating Renesas RH850 System-on-Chip using Unicorn Engine Brought to you by Damien Cauquil (@[email protected]) and Phil BARRETT to make your automotive vulnerability research easier blog.quarkslab.com/emulating-rh85…

Fast and Curious: Emulating Renesas RH850 System-on-Chip using Unicorn Engine 
Brought to you by <a href="/virtualabs/">Damien Cauquil (@virtualabs@mamot.fr)</a>  and <a href="/Phil_BARR3TT/">Phil BARRETT</a> to make your automotive vulnerability research easier

blog.quarkslab.com/emulating-rh85…
⚡𝕊ℍ𝔸𝕂𝕀ℝ⚡ (@shakirzari) 's Twitter Profile Photo

Check out my new blog, coauthored with Jerin S Learn how we unlocked Renesas RH850 security by breaking 16-byte ID code authentication using Voltage Glitching to extract firmware on Automotive ECUs. Read the full article here: lnkd.in/d3zqKE6a #AutomotiveSecurity

hardwear.io (@hardwear_io) 's Twitter Profile Photo

An interesting talk at #hw_ioUSA2024 🚗 👨‍💻 that allows uploading a payload to RAM and getting the ECU to execute it. Using this exploit, Willem Melching and Greg Hogan could extract the SecOC keys. YouTube Link: youtu.be/8958gH3KD3Y?si… #carhacking #secoc #reverseengieering

Willem Melching (@pd0wm) 's Twitter Profile Photo

We did it again!!! We got 1st place in the #defcon32 Car Hacking Village CTF. This year we won a Tesla Model 3, and the whole team has their own Black Badge now 😎. Greg Hogan Robbe Derks

We did it again!!! We got 1st place in the #defcon32 <a href="/CarHackVillage/">Car Hacking Village</a> CTF. This year we won a Tesla Model 3, and the whole team has their own Black Badge now 😎. <a href="/gregjhogan/">Greg Hogan</a> <a href="/robbederks/">Robbe Derks</a>
Willem Melching (@pd0wm) 's Twitter Profile Photo

So you want to build some shellcode for an ECU? I made a collection of Dockerfiles to set up gcc for V850, PowerPC-VLE and TriCore. It compiles binutils and gcc based on the GPL sources/patches from the proprietary compilers such as S32DS and HighTec C. github.com/I-CAN-hack/aut…

So you want to build some shellcode for an ECU? I made a collection of Dockerfiles to set up gcc for V850, PowerPC-VLE and TriCore.

It compiles binutils and gcc based on the GPL sources/patches from the proprietary compilers such as S32DS and HighTec C.

github.com/I-CAN-hack/aut…
Willem Melching (@pd0wm) 's Twitter Profile Photo

I created a small automotive themed CTF! The first person to solve all the challenges will get a free CAN Bus Throwing Star. Check it out at ctf-teaser.icanhack.nl

I created a small automotive themed CTF! The first person to solve all the challenges will get a free CAN Bus Throwing Star. Check it out at ctf-teaser.icanhack.nl
Willem Melching (@pd0wm) 's Twitter Profile Photo

Congratulations to stephandb for being the first to solve all the challenges! He also provided an excellent write-up: icanhack.nl/ctf_writeup.pdf. The CTF will stay up for a few more weeks, so don't worry if you haven't been able to finish all the challenges yet.

Willem Melching (@pd0wm) 's Twitter Profile Photo

Inspired by Fraktal's Laser Fault Injection rig, I got an xTool F1. I probably need to use some HNO3 to take off the last bit of packaging. The chips no longer work if I go too far, and the die also looks visually damaged.

Inspired by <a href="/FraktalCyber/">Fraktal</a>'s Laser Fault Injection rig, I got an xTool F1. I probably need to use some HNO3 to take off the last bit of packaging. The chips no longer work if I go too far, and the die also looks visually damaged.