MetaSploitFramework Automotive
Use Metasploit Framework Automotives modules.
How to?
First you need to press on ‘start msfconsole’, it use screen to dettach and reattach msf session to be able to run the module in the same instance.
Once msf is started, select your module and use “Info” to read module information, “Set” to configure module, and finally “Run” to execute it.
Note : Actually, we can’t automatically close the terminal window, so keep in mind that previous terminal window will still be opened but killed.
Hardware Tools : ELM327 Relay
- elm327_relay : This module requires a connected ELM327 or STN1100 is connected to the machines serial. Sets up a basic RESTful web server to communicate
Auxiliary Modules
- local_hwbridge : Sets up a web server to bridge communications between Metasploit and physically attached hardware.
- connect : Connect the physical HWBridge which
will start an interactive hwbridge session (local_hwbridge should be running).
Post Modules
- can_flood : Floods a CAN interface with supplied frames.
- canprobe : Scans between two CAN IDs and writes data at each byte position.
- diagnostic_state : Keep the vehicle in a diagnostic state on rounds by sending tester present packet.
- ecu_hard_reset : Performs hard reset in the ECU Reset Service Identifier (0x11).
- getvinfo : This module queries DTCs, some common engine info, and vehicle information.
- identifymodules : Scan the CAN bus for any modules that can respond to UDS DSC queries.
- malibu_overheat : Simple sample temp flood for the 2006 Malibu.
- mazda_ic_mover : Moves the needle of the accelorometer and speedometer of the Mazda 2 instrument cluster.
- pdt : Acting in the role of a Pyrotechnical Device Deployment Tool (PDT)