In this talk, Javier and Ferdi proudly present the CanBadger. It is a tool that aims at speeding up reverse engineering and penetration testing of automotive systems. It is not a regular CAN interface – in fact, it can be controlled by a computer using USB or Ethernet but it can also run in standalone mode without a computer. Furthermore, the CanBadger can be fully assembled for under 40 USD. With this tool, existing and new attacks can be conducted in an easy, burpsuite style way. The audience will be introduced to the rich feature set of the CanBadger. After a short introduction to protocols, there will be a live demonstration, covering the novel Diagnostics Security Hijack and Man-in-the-middle Attacks. The Replay and Emulator modes will also be covered.