gallia: comprehensive penetration testing toolchain for cars
Gallia is an extendable pentesting framework with the focus on the automotive domain. The scope of the toolchain is conducting penetration tests from a single ECU up to whole cars, with the main focus on the UDS interface.
The initial development was publicly sponsored by the German Federal Ministry of Education and Research, as part of the SecForCARs Project. A short presentation and demo video can be found here.
Artifacts Folder Structure
Gallia uses its own folder structure to store its scan results (called artifacts). The structure is as follows:
– LATEST -> <latest run dir>
Every scan run creates the following artifact files:
|OUTPUT.zstd||Compressed log file|
|META.json||Information about the executed Scanner|
|ecu_params_pre.json||ECU parameters read before the scan|
|ecu_params_post.json||ECU parameters read after the scan|
When physically connected to the ECU, we first need to identify all available endpoints on the DUT. Depending on the target protocol, different discover scanners are provided:
- gallia discover-can-ids (UDS)
- gallia discover-endpoints (UDS)
- gallia discover-iso-tp-addr (UDS)
- discover-xcp (XCP)
The identified endpoints are stored in the ECUs.txt artifact file.
The following table shows the most important UDS scanner. For a complete list, please have a look at the help page.
|scan-services||Iterate sessions and services and find endpoints|
|scan-sessions||Iterate Sessions (recursively)|
|scan-identifiers||This scanner scans DataIdentifiers of various services.|
Gallia can log all its scan results into a sqlite database.
Install & Use
Copyright (C) 2022 Fraunhofer-AISEC