Kali Linux

CarPunk : The Car Hacking Toolkit

CarPunk IS VERY SIMILAR TO CANghost, ONLY THE DEFFERENCE IS, IT COMES WITH OPTIONS TO ENABLE OR DISABLE INTERFACE AND BASIC SNIFFING AS EXTRA.

  • IT WORKS ON BOTH SIMULATION & REAL CARS.
  • HAS THE OPTIONS TO RECORD AND PLAY THE CAN PACKETS.
  • NO ANY ARGUMENTS REQUIRED WHEN RUNNING BUT NEED CHANGES(Interface & Name for logfile), IF YOU’RE TRYING IN REAL-WORLD.
  • TESTED ON UBUNTU WITH BOTH SIMULATOR & REAL CARS.

THINGS TO DO BEFORE RUNNING CARPUNK

  • YOU HAVE TO LOAD YOUR CANBUS DRIVER MANUALLY, CARPUNK ONLY DOES UP AND DOWN.
  • OPEN carpunk.sh FILE INTO YOUR FAVORITE TEXT-EDITOR AND CHANGE THE INTERFACE AND LOG-FILENAME AS PER YOUR NEED. DELAFULT INTERFCE IS vcan0 & carpunk AS LOG-FILENAME.
  • Installation & Usage of CarPunk :

git clone https://github.com/souravbaghz/CarPunk
cd CarPunk
sudo bash carpunk.sh

  • [1] UP the CAN Interface : To Enable/UP the CAN Interface.
  • [2] Down the CAN Interface : Make The CAN Interface Down.
  • [3] Start the Basic Sniffing : To Start Sniffing Only(get terminal clear as soon as you stop it by ctrl+c).
  • [4] Record the CAN Packets : To Capture/Record The CAN Packets Into File(as carpunk1.log- name will be carpunk2.log,carpunk3.log,so on for multiple times).
  • [5] Play the CAN Packets : Replay The CAN Packets Which You Captured Earlier(Need to specify the log-file. e.g: carpunk1.log).
  • [0] Exit : To Exit The CarPunk Script.
R K

Recent Posts

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 day ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 day ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

6 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

1 week ago