Challenge Data

Challenges and data files for capture-the-flag style events to learn about heavy vehicle cybersecurity.

A candump data log was capture during a diagnosic session using Linux SocketCAN. The data comes from a J1939 network that contained a couple ECUs and a diagnostics adapter. A man-in-the-middle was inserted between the main J1939 and an ECU. The man in the middle can change message traffic as it is passing it from one side of the MITM to the other. In this file, there was only an attack on 1 message. The challenge is to determine the following based on the data in this log file:

  1. What was PGN of the attack?
  2. Which ECU was the subject of the attack?
  3. What data was changed?

A candump data log was capture during a startup seqence for a truck using Linux SocketCAN. The data comes from 2014 Class 6 truck with a box van where the operator started the engine, pressed the accelerator pedal and turned the engine off. The challenge is to determine the highest engine speed in RPM base on the log file.

Some other questions for consideration:
  1. How many ECUs are on the network?
  2. What is the vehicle mileage?
  3. Did the vehicle's wheels rotate?