Offline Reverse Engineering Tools for Automotive Networks
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
reversegear packaging working, deployed to PyPI as v0.1.0 Aug 30, 2017
.gitignore initial commit Aug 24, 2017
LICENSE.txt packaging working, deployed to PyPI as v0.1.0 Aug 30, 2017
README.rst more readme formmating Aug 30, 2017
requirements.txt initial commit Aug 24, 2017
run.py initial commit Aug 24, 2017
setup.py packaging working, deployed to PyPI as v0.1.0 Aug 30, 2017

README.rst

ReverseGear: Offline Reverse Engineering Tools for Automotive Networks

Installation

ReverseGear can be installed with pip: pip3 install reversegear.

Rationale

A variety of techniques exist for reverse engineering components by analyzing vehicle logs. ReverseGear aims to provide tools for automating these techniques. It is only intended for working offline, using logs of network traffic. For an online tool, see caringcaraboo.

Inputs

Currently, only candump format logs files are supported. To generate a log using candump, the -l (or -L) flag must be used.

For example, to log from the can0 interface:

candump -l can0

Commands

ReverseGear uses a number of subcommands. In general, you can get help with reversegear --help, and reversegear [subcommand] --help.

ids

Subcommand for generating arbitration ID statistics.

Usage: reversegear uds [-h] tx_id rx_id inputs [inputs ...]

Example: reversegear ids log.txt

uds

Subcommand for decoding Unified Diagnostic Services (ISO14229) traffic. Requires the arbitration ID transmitted by the client/scan tool (tx_id) and the arbitration ID received by the client/scan tool (rx_id).

Usage: reversegear uds [-h] tx_id rx_id inputs [inputs ...]

Example: reversegear uds 0x7F1 0x7F9 log.txt

iddiff

Subcommand for displaying unique arbitration IDs in two files.

Usage: reversegear iddiff [-h] a b

Example reversegear iddiff log_one.txt log_two.txt