CAN Protocol Reverse Engineering with Wireshark

Поділитися
Вставка
  • Опубліковано 29 вер 2024
  • In this video, we are using a cheap and open hardware CAN to USB adapter to sniff and analyze the CAN frames on an existing bus in Wireshark.
    Additionally, we are going to inject CAN frames onto the bus using the cansend utility that is available from the can-utils package that is readily available in most Linux distributions like Debian and Raspberry Pi OS.
    See also:
    An overview of the various can-utils, like candump, cansend and cangen:
    www.pengutroni...
    Read how to use systemd-networkd to set up CAN interfaces:
    www.pengutroni...
    Find out what makes CAN a great choice of protocol even outside of cars:
    www.pengutroni...
    Buy a candleLight and support the production of new videos:
    shop.linux-aut...

КОМЕНТАРІ • 12

  • @Other-AllOfTheAbove
    @Other-AllOfTheAbove 2 роки тому +6

    Excellent video showcasing the major aspects of reverse engineering. Greatly done showing the devices and basic line connections. This demonstration is quite valuable from many perspectives.
    Its a bit confusing as to why you chose sub index 08 to obtain the analog input 0, if possible please specify why that was your hunch.

  • @action4free369
    @action4free369 11 місяців тому

    Danke ❤

  • @autohmae
    @autohmae 11 місяців тому +2

    Their are 2 types of people in the world, those who CAN and does who don't. You clearly CAN, thanks, very interesting

  • @pierrec1590
    @pierrec1590 2 місяці тому

    1) Using Linux 2) ...with Wireshark 3) scripting cansend This is PURE gold! Thanks!

  • @danwaterloo3549
    @danwaterloo3549 11 місяців тому +1

    Thanks for the presentation, very interesting! You have a good grasp of how to use wireshark.

  • @evlsc400
    @evlsc400 11 місяців тому

    I need help with a project, I want to install CANBUS ventilated seats from a newer model car into an older model car that doesn't have CANBUS. I understand I can directly wire up the heated seat portion of the seats but can't activate the ventilated portion, would I just reverse engineer the signals of the seats and then have them sent from a micro controller and switch? or is there more to it than that? Does the seats module/brain need information from an ECU or can I basically wire and adapt canbus systems into my car, decode them all from various models and have their commands sent via microcontroller physical switches or a head unit ? Thank you.

  • @JanPoznanski
    @JanPoznanski Рік тому +3

    I found you thanks to a header in the can-utils source code. It's a pity that such valuable materials are not automatically promoted by UA-cam. Thank you.

  • @klauszinser
    @klauszinser Рік тому

    From Min 11:00 CANopen

    • @klauszinser
      @klauszinser Рік тому

      What i missed (not discussed), with CANopen there is an EDS file defining the devices and information that can be retrieved. Is it possible to integrate the *.eds file with wireshark?

    • @Pengutronix
      @Pengutronix  Рік тому

      I am currently not aware of *.eds-Support in Wireshark. The quick reference for the CANOpen dissector is here: wiki.wireshark.org/CANopen.md (^cfi)

    • @klauszinser
      @klauszinser Рік тому

      @@Pengutronix Right now its not there. I put questions and a request.