• Coventry University logo

Ethical Hacking CAN Protocol

Discover the CAN network’s vulnerabilities and some interesting ways to ethically exploit them.

Ethical Hacking CAN Protocol
  • Duration2 weeks
  • Weekly study10 hours

Is it easy to reverse engineer CAN data?

On this course, through open source simulation tools, CAN data will be captured and a potential replay attack will be demonstrated.

A systematic appreciation will also be demonstrated for privacy and policy issues regarding the use of personal and sensitive data generated on modern automotive platforms, in the context of sensing, communication and storage.

What topics will you cover?

  • Kali Linux
  • ICSim
  • Replay attack

What will you achieve?

By the end of the course, you‘ll be able to...

  • Demonstrate practical attacks on CAN protocol
  • Record CAN data and understand its content
  • Explore the ability to reverse engineer captured CAN data
  • Perform replay attack on CAN protocol

Who is the course for?

MSc Cyber Security students.

Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.

Who developed the course?

Coventry University

Coventry secured gold in the UK Government’s 2017 Teaching Excellence Framework (TEF) and is University of the Year for Student Experience in The Times & The Sunday Times Good University Guide 2019.

  • Established1992
  • LocationCoventry