You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Acting in the role of a Pyrotechnical Device Deployment Tool (PDT), this module will first query all Pyrotechnic Control Units (PCUs) in the target vehicle to discover how many pyrotechnic devices are present, then attempt to validate the security access token using the default simplified algorithm. On success, the vehicle will be in a state that is prepped to deploy its pyrotechnic devices (e.g. airbags, battery clamps, etc.) via the service routine. (ISO 26021)
2
+
3
+
This module is based on research by Johannes Braun and Juergen Duerrwang, which you can read more about [here](https://www.researchgate.net/publication/321183727_Security_Evaluation_of_an_Airbag-ECU_by_Reusing_Threat_Modeling_Artefacts) along with related [CVE-2017-14937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937).
4
+
5
+
## Options
6
+
7
+
**SRCID**
8
+
9
+
This is the SRC CAN ID for the PCU connection. Default is 0x7F1.
10
+
11
+
**DSTID**
12
+
13
+
This is the CAN ID of the expected response. Default is 0x7F9.
14
+
15
+
**CANBUS**
16
+
17
+
Determines which CAN bus to communicate on. Type 'supported_buses' for valid options.
18
+
19
+
**PADDING**
20
+
21
+
Optional byte-value to use for padding all CAN bus packets to an 8-byte length. Padding is disabled by default.
22
+
23
+
## Scenarios
24
+
25
+
A successful unlock and prepped-to-deploy of pyrotechnic devices in a target vehicle:
26
+
27
+
```
28
+
$ ./msfconsole -q
29
+
msf > use auxiliary/server/local_hwbridge
30
+
msf auxiliary(local_hwbridge) > set uripath /
31
+
uripath => /
32
+
msf auxiliary(local_hwbridge) > run
33
+
[*] Auxiliary module running as background job 0.
34
+
35
+
[*] Using URL: http://0.0.0.0:8080/
36
+
[*] Local IP: http://10.0.2.4:8080/
37
+
[*] Server started.
38
+
39
+
msf auxiliary(local_hwbridge) > use auxiliary/client/hwbridge/connect
40
+
msf auxiliary(connect) > run
41
+
42
+
[*] Attempting to connect to 127.0.0.1...
43
+
[*] Hardware bridge interface session 1 opened (127.0.0.1 -> 127.0.0.1) at 2017-12-17 10:41:27 -0600
0 commit comments