That’s helpful. Appreciate the commentary and in depth of understanding you conveyed.
Well... fine.
The mere fact that you asked "which sets of CAN bus wires are involved with starting the vehicle, and which are susceptible to being 'hacked' to steal the vehicle" indicates that you really don't understand the concept of digital communication.
The CAN bus is just that - a communications bus, not unlike a home ethernet network. But a much older ethernet network, before there were switches (intelligent, store-and-forward relay devices that operated at layer 2 of the OSI model and forward data packets based on media access control [MAC] addresses). We're talking about dumb hubs that operate at layer 1 (the physical layer) and just electrically connect each port together, such that when a voltage is applied on one port's transmit pin, it is duplicated onto every other port's receive pin. So any time any device on the CAN bus "talks" (rapidly switches voltage on and off on it's transmit line), every other connected device "hears" it (voltage applied to the receive line). Think morse code, but at a rate of about 100,000 characters per second.
So, given the fact that any device on the bus can talk to any other device, it's perfectly possible to connect to the CAN bus wires on a headlight (because the actual headlight "driver" is also connected to the CAN bus, so that the Front Control Module can send a msg that says, "front headlights - ON!"), and instead send a msg. to the powertrain control module that says, "start the engine".
We can delve further into the protocols, packet structures, arbitration processes, error detection/correction, and a myriad of other concepts, but that's probably not really necessary.
Good?