Skip to main content

EVSE Red Team Toolkit

Project description

evsetool

A command-line utility to probe EVSE and CSMS over OCPP1.6, and sniff OCPP traffic over LAN.

Description

Open Charge Point Protocol (OCPP) is used to communicate betweeen Electric Vehicle Supply Equipment (EVSE) and Charge Station Management Systems (CSMS). This tool makes use of the OCPP library provided by MobilityHouse to query these systems for purposes of red team engagement. Using scapy, evsetool can also listen for all OCPP1.6 traffic sent over the local network (i.e. the WiFi network the EVSE is connected to).

Versions 2.0 and later of the OCPP protocol implement actual encryption, so the purpose of this tool in its current form is to demonstrate the vulnerability of OCPP1.6 in order to speed adoption of newer versions of the protocol.

*** This tool is for educational and awareness purposes only. Do NOT use this tool to attempt to breach systems for which you do not have explicit authorization to do so. The author(s) of this tool are not liable for any misuse of the tool ***

Getting Started

Dependencies

evsetool requires the following dependencies:

The tutorial in this section requires the following additional dependencies:

  • Docker, with Docker Compose available

Installing

Windows

To install:

git clone https://github.com/witchofthewires/evsetool.git
cd evsetool
python -m venv venv
.\venv\Scripts\activate
pip install -r requirements.txt
pip install . --force-reinstall

To run associated tests:

python -m pytest -v

Linux

To install:

git clone https://github.com/witchofthewires/evsetool.git
cd evsetool
make init
make install

To run associated tests:

make test

Testing with StEVe

The following instructions apply to Linux environments only.

To install StEVe, an open source CSMS, for purposes of testing:

git clone https://github.com/steve-community/steve.git
cd steve
sudo docker-compose up -d

Wait about 5 minutes for Docker Compose to bring the StEVE application online, then execute the following:

make init-steve-db

To run the sniffer, execute the following in the evsetool directory:

sudo venv/bin/python -m evsetool --sniff -v

To query the CSMS with a dummy transaction, open a different terminal and execute the following in the same directory:

venv/bin/python -m evsetool --csms -v

If all goes well, your output should resemble the following. Screenshot showing an example use of the evsetool. There are two terminals. The right terminal interacts with the CSMS server, while the left terminal sniffs and decodes the OCPP traffic.

Development Roadmap

  • Add roadmap to README
  • Parse OCPP1.6 Core on wired LAN/local loopback
  • Decrypt 802.11 traffic for WPA-PSK key material
  • Combine previous two steps to decrypt and decode OCPP1.6 Wifi traffic on the fly (est. 2025-1-11)
  • Implement all OCPP1.6 messages/profiles (est. 2025-2-1)
  • Add attack options (est. 2025-3-1)
    • EvilCSMS generic MITM prestage
    • Unauthorized start/stop transaction
    • Malicious firmware update
  • Update other projects to support OCPP1.6 protocols (est. 2025-6-1)
    • Wireshark
      • WebSockets over Wifi/sniffed 802.11
      • OCPP1.6
    • Scapy
      • WebSockets
      • Real-time 802.11 WPA-PSK decryption
      • OCPP1.6
  • Implement additional 802.11 support (est 2025-9-1)
    • WEP
    • WPA3

See the open issues for a full list of proposed features (and known issues).

License

This project is licensed under the MIT License - see the LICENSE.md file for details

Acknowledgements

Starting point for WebSocket parser

Wifi Decryption

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

evsetool-0.1.4.tar.gz (4.8 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

evsetool-0.1.4-py3-none-any.whl (14.1 kB view details)

Uploaded Python 3

File details

Details for the file evsetool-0.1.4.tar.gz.

File metadata

  • Download URL: evsetool-0.1.4.tar.gz
  • Upload date:
  • Size: 4.8 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.2

File hashes

Hashes for evsetool-0.1.4.tar.gz
Algorithm Hash digest
SHA256 671c3d948ed85dd250271fef26b6f789d449186012b80b4e2cfec750dde8aac2
MD5 8cb0a4c01db867fb793f896e8e8f7f01
BLAKE2b-256 b3b8f08901acdea75e2ff7f053446b88b453a485c31202627fef6819d2ec6acd

See more details on using hashes here.

File details

Details for the file evsetool-0.1.4-py3-none-any.whl.

File metadata

  • Download URL: evsetool-0.1.4-py3-none-any.whl
  • Upload date:
  • Size: 14.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.2

File hashes

Hashes for evsetool-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 fd183b46e8b60afea1aa03a34bf859cc7d5f90c862f534b3c9db2bc90b19d387
MD5 0001c1034b86771316b84b74acfd73c1
BLAKE2b-256 a84e5ecc1469d8fd507f60f44dd236f1f192c0a674d8a62144eea77afbd22fbc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page