SlideShare uma empresa Scribd logo
1 de 48
Hacking Satellite:
A New Universe to Discover


Jim Geovedi and Raditya Iryandi
BELLUA ASIA PACIFIC
HACKING SATELLITE: A New Universe to Discover




Disclaimer
   This presentation is intended to demonstrate the inherent security, design and
   configuration flaws in publicly accessible satellite communication networks and
   promote the use of safer satellite communication systems. Viewers and readers
   are responsible for their own actions and strongly encourage to behave
   themselves.




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          2
HACKING SATELLITE: A New Universe to Discover




Satellite
   •    A satellite is any object that orbits another
        object (which known as its primary).

Artificial Satellites
   •    It was the English sci-fi writer Arthur C.
        Clarke who conceived the possibility of
        artificial communication satellites in 1945.
        Clarke examined the logistics of satellite
        launch, possible orbits and other aspects.

   •    The first artificial satellite was Sputnik 1
        launched by Soviet Union on
        4 October 1957


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          3
HACKING SATELLITE: A New Universe to Discover




Types of Artificial Satellites
    •   Astronomical satellites                                                    •    Solar power satellites

    •   Reconnaissance satellites                                                  •    Space stations

    •   Navigation satellites                                                      •    Weather satellites

    •   Killer satellites/anti-satellite weapons                                   •    Miniaturised satellites

                                                                                   •    Biosatellites




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          4
HACKING SATELLITE: A New Universe to Discover




How is a Satellite Launched into an Orbit?




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          5
HACKING SATELLITE: A New Universe to Discover




Satellite Internet Services
   •    Used in locations where terrestrial Internet access is not available and in
        locations which move frequently, e.g. vessels at sea and war zone.

   •    Can be used where the most basic utilities are lacking, require a generator or
        battery power supply that can produce enough electricity.




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          6
HACKING SATELLITE: A New Universe to Discover




Three Types of Satellite Internet Services
   •    One-way multicast: used for IP multicast-based data, audio and video
        distribution. Most Internet protocols will not work correctly over one-way
        access, since they require a return channel.

   •    One-way with terrestrial return: used with traditional dial-up access to the
        Internet, with outbound data travelling through a telephone modem, but
        downloads are sent via satellite at a speed near that of broadband Internet
        access.

   •    Two-way satellite access: allows upload and download data
        communications.




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          7
HACKING SATELLITE: A New Universe to Discover




Very Small Aperture Terminal (VSAT)
   •    Two-way satellite ground station with a dish
        antenna that is smaller than 3 metres.

   •    Nearly all VSAT systems are now based on
        IP, with a very broad spectrum of
        applications.

   •    Most commonly used interactive and
        transactional application (online
        communication between head office and
        branches, flight ticket and hotel reservation,
        ATM (Automated Teller Machine) and small
        data traffic) and terminal application with
        centralised database (data entry, inventory
        control and payment point)

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          8
HACKING SATELLITE: A New Universe to Discover




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          9
HACKING SATELLITE: A New Universe to Discover




                                         Internal Computer
                                               (TT&C)

                                                                           Body




                Power source                                                       Attitude control



                                                     Grapple Fixture




                                                              Communications

      Satellite Anatomy


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          10
HACKING SATELLITE: A New Universe to Discover




     The Control Centre


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          11
HACKING SATELLITE: A New Universe to Discover




    Tracking, Telemetry and Command Station


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          12
HACKING SATELLITE: A New Universe to Discover




Topologies of VSAT
   •    A star topology, using a central uplink site, such as a network operations
        centre (NOC), to transport data back and forth to each VSAT terminal via
        satellite,

   •    A mesh topology, where each VSAT terminal relays data via satellite to
        another terminal by acting as a hub, minimising the need for a centralised
        uplink site,

   •    and a combination of both star and mesh topologies.




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          13
HACKING SATELLITE: A New Universe to Discover




Satellite Footprint
   •    The footprint of a satellite is the ground area
        that its transponders cover, and determines
        the satellite dish diameter required to
        receive each transponder's signal.

   •    There is usually a different map for each
        transponder (or group of transponders) as
        each may be aimed to cover different areas
        of the ground.

   •    Footprint maps usually show either the
        estimated minimal satellite dish diameter
        required, or the signal strength in each area
        measured in dBW.


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          14
100º E - 145.9ºHACKING SATELLITE: A New Universe to Discover
                                                                                E
                                                     (SE Asia, Australia, China, Japan, Korea)
         Satellite Name                Position          HD TV          TV Digital     TV Analog         Radio Digital Radio Analog   Data
           ASIASAT 2                 100.5º East            0               97              0                51             0          4
          EXPRESS A2                 103.0º East            0               13              0                12             0          2
           ASIASAT 3S                105.5º East            0              258              0                56             0          22
        CAKRAWARTA 1                 107.7º East            0               70              0                19             0          5
           TELKOM 1                  108.0º East            0               57              0                 0             0          4
              AAP 1                  108.2º East            0               57              0                 0             0          17
          BSAT 1A, 2A                110.0º East           10               3               4                14             0          0
           JCSAT 110                 110.0º East            0               63              0                20             0          0
           SINOSAT 1                 110.5º East            0               59              0                36             0          4
           PALAPA C2                 113.0º East            0               31              2                 4             0          8
          KOREASAT 2                 113.0º East            0               48              0                 0             0          3
          KOREASAT 3                 116.0º East            0              125              0                 1             0          12
           TELKOM 2                  118.0º East            0               1               0                 0             0          0
          THAICOM 1A                 120.0º East            0               6               0                 1             0          0
           ASIASAT 4                 122.0º East            0               79              0                 1             0          17
            JCSAT 4A                 124.0º East            0               93              0                 0             0          7
            JCSAT 3                  128.0º East            0              142              0                103            0          21
            JCSAT 5A                 132.0º East            0               2               0                 0             0          0
            APSTAR 6                 134.0º East            0               46              2                55             0          3
    APSTAR V / TELSTAR 18            138.0º East            0              151              0                 0             0          2
         EXPRESS AM3                 140.0º East            0               14              0                 8             0          1
         SUPERBIRD C                 144.0º East            0               57              0                 4             0          0

                                        source: http://www.satcodx4.com/eng/ accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                                       15
HACKING SATELLITE: A New Universe to Discover




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          16
HACKING SATELLITE: A New Universe to Discover




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          17
HACKING SATELLITE: A New Universe to Discover




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          18
HACKING SATELLITE: A New Universe to Discover




        MEASAT-1 @ 91.5º East


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          19
HACKING SATELLITE: A New Universe to Discover




       PALAPA C2 @ 113.0º East


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          20
HACKING SATELLITE: A New Universe to Discover




       TELKOM 1 @ 108.0º East


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          21
HACKING SATELLITE: A New Universe to Discover




       TELKOM 2 @ 118.0º East


Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          22
HACKING SATELLITE: A New Universe to Discover




Attacks against Satellite Systems

It’s politically sensitive, but it’s going to happen. Some people don’t want
to hear this, and it sure isn’t in vogue … but—absolutely—we’re going to
fight in space. We’re going to fight from space and we’re going to fight
into space…
                                                                                                         General Joseph W. Ashy
                                                                             Former Commander in Chief U.S. Space Command




                         source: http://www.au.af.mil/au/awc/awcgate/saas/spacy_wl.pdf accessed on 21 September 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          23
HACKING SATELLITE: A New Universe to Discover




Hypothetical Attacks against Satellite Systems




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          24
HACKING SATELLITE: A New Universe to Discover




Denial of Service Attacks
   •    Jam uplink and downlink

        •    White noise at frequency.

        •    Requires directed antenna.

        •    Requires very low power.

        •    Difficult to detect, especially if occurring
             at irregular intervals.




                                 source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          25
HACKING SATELLITE: A New Universe to Discover




Denial of Service Attacks
   •    Overpower uplink

        •    Can be done with transportable satellite
             ground terminals

             •    In tri-band (C-band, X-band, and
                  Ku-band).

        •    Power limited.

        •    Uplink equipment now contains ID
             coding.


                                 source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          26
HACKING SATELLITE: A New Universe to Discover




Orbital Positioning Attacks
   •    Ranging transponder spoofing

        •    Multiple ground stations triangulate
             satellite position using a series of tones
             sent to a transponder.

        •    Ground stations observe phase
             differentials.

        •    Ground or airborne spoofer could
             transmit false response, resulting in
             incorrect orbit determination.


                                 source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          27
HACKING SATELLITE: A New Universe to Discover




Orbital Positioning Attacks
   •    Direct commanding

        •    Preparation and delivery of telecommand
             queue.

   •    Command replay

        •    Record outbound telecommand queue
             from TT&C facility. Replay later to initiate
             duplicate action.



                                 source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          28
HACKING SATELLITE: A New Universe to Discover




Orbital Positioning Attacks
   •    Insertion after confirmation but prior to
        execution

        •    SCC formulates telecommand queue and
             sends to TT&C.

        •    TT&C uplinks and receives readback,
             which it returns to SCC.

        •    If readback is correct, SCC waits for
             proper time to execute.

        •    Channel is vulnerable to update during
             this period — new telecommand queue
             may be uploaded prior to authenticated
             execute.
                                 source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006

Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          29
HACKING SATELLITE: A New Universe to Discover




Practical Attacks against Satellite Systems




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          30
HACKING SATELLITE: A New Universe to Discover




Satellite Piggyjacking:
Compromise Network Layer




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          31
HACKING SATELLITE: A New Universe to Discover




Compromise Network Layer:
   •    Selecting Target

   •    Pointing Antenna

   •    Find “free” Frequency

   •    Trasmit and Receive

   •    Detection Evasion




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          32
HACKING SATELLITE: A New Universe to Discover




   •    DEMO




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          33
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          34
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          35
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency




 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          35
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                   Real User

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          35
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                   Real User

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          36
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                   Real User                       Us

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          36
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                   Real User                       Us

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          37
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                   Real User                       Us

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          38
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                                                   Us

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          38
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency


                                                                                   Us

 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          39
HACKING SATELLITE: A New Universe to Discover


Rogue Carrier Detection Evasion




                                                         Allocated Frequency




 Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          40
HACKING SATELLITE: A New Universe to Discover




Hijacking DVB Connection:
Compromise Data Link Layer




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          41
HACKING SATELLITE: A New Universe to Discover




Compromise Data Link Layer:
   •    Selecting Target

   •    Pointing Antenna

   •    Find Interesting Carrier

   •    Scanning MAC Address

   •    Scanning Free IP Address

   •    Viola!




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          42
HACKING SATELLITE: A New Universe to Discover




   •    DEMO




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          43
HACKING SATELLITE: A New Universe to Discover




   •    DISCUSSION




Warning: You are allowed to steal any contents of this material with or without notifying the authors.                          44

Mais conteúdo relacionado

Mais procurados

Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
 
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pas
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pasSécurité informatique : le Retour sur Investissement que vous n'attendiez pas
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pasMaxime ALAY-EDDINE
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?Ryan G. Murphy
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT SecurityNUS-ISS
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutDevSecCon
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Fuxi introduction(english)
Fuxi introduction(english)Fuxi introduction(english)
Fuxi introduction(english)nkzhangni
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfAlonzoJames2
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) BGA Cyber Security
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 

Mais procurados (20)

Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pas
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pasSécurité informatique : le Retour sur Investissement que vous n'attendiez pas
Sécurité informatique : le Retour sur Investissement que vous n'attendiez pas
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Forti web
Forti webForti web
Forti web
 
Fuxi introduction(english)
Fuxi introduction(english)Fuxi introduction(english)
Fuxi introduction(english)
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC)
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 

Semelhante a Hacking Satellite: A New Universe to Discover

Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionHacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionJim Geovedi
 
Hacking a Bird in the Sky
Hacking a Bird in the SkyHacking a Bird in the Sky
Hacking a Bird in the Skyshizhao
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipJim Geovedi
 
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...M H
 
Nano satellite by anil
Nano satellite by anilNano satellite by anil
Nano satellite by anilAnil Yadav
 
Satellite communication valladolid
Satellite communication valladolidSatellite communication valladolid
Satellite communication valladolidSarah Krystelle
 
Applications of Satellite communication.pptx
Applications of Satellite communication.pptxApplications of Satellite communication.pptx
Applications of Satellite communication.pptxAYUSHJAIN152065
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet CollaboratoryLarry Smarr
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet CollaboratoryLarry Smarr
 

Semelhante a Hacking Satellite: A New Universe to Discover (10)

Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionHacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT Connection
 
Hacking a Bird in the Sky
Hacking a Bird in the SkyHacking a Bird in the Sky
Hacking a Bird in the Sky
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
 
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
 
Outernet ready to present ppt
Outernet ready to present pptOuternet ready to present ppt
Outernet ready to present ppt
 
Nano satellite by anil
Nano satellite by anilNano satellite by anil
Nano satellite by anil
 
Satellite communication valladolid
Satellite communication valladolidSatellite communication valladolid
Satellite communication valladolid
 
Applications of Satellite communication.pptx
Applications of Satellite communication.pptxApplications of Satellite communication.pptx
Applications of Satellite communication.pptx
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 

Mais de Jim Geovedi

Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaJim Geovedi
 
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Jim Geovedi
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 
Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour ruleJim Geovedi
 
Professional Hackers
Professional HackersProfessional Hackers
Professional HackersJim Geovedi
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobetJim Geovedi
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log ManagementJim Geovedi
 
Satellite Telephony Security
Satellite Telephony SecuritySatellite Telephony Security
Satellite Telephony SecurityJim Geovedi
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsJim Geovedi
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingJim Geovedi
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Jim Geovedi
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank JobJim Geovedi
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot SecurityJim Geovedi
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundJim Geovedi
 

Mais de Jim Geovedi (20)

Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
 
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour rule
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
 
Satellite Telephony Security
Satellite Telephony SecuritySatellite Telephony Security
Satellite Telephony Security
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry Birds
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite Hacking
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot Security
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Hacking Satellite: A New Universe to Discover

  • 1. Hacking Satellite: A New Universe to Discover Jim Geovedi and Raditya Iryandi BELLUA ASIA PACIFIC
  • 2. HACKING SATELLITE: A New Universe to Discover Disclaimer This presentation is intended to demonstrate the inherent security, design and configuration flaws in publicly accessible satellite communication networks and promote the use of safer satellite communication systems. Viewers and readers are responsible for their own actions and strongly encourage to behave themselves. Warning: You are allowed to steal any contents of this material with or without notifying the authors. 2
  • 3. HACKING SATELLITE: A New Universe to Discover Satellite • A satellite is any object that orbits another object (which known as its primary). Artificial Satellites • It was the English sci-fi writer Arthur C. Clarke who conceived the possibility of artificial communication satellites in 1945. Clarke examined the logistics of satellite launch, possible orbits and other aspects. • The first artificial satellite was Sputnik 1 launched by Soviet Union on 4 October 1957 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 3
  • 4. HACKING SATELLITE: A New Universe to Discover Types of Artificial Satellites • Astronomical satellites • Solar power satellites • Reconnaissance satellites • Space stations • Navigation satellites • Weather satellites • Killer satellites/anti-satellite weapons • Miniaturised satellites • Biosatellites Warning: You are allowed to steal any contents of this material with or without notifying the authors. 4
  • 5. HACKING SATELLITE: A New Universe to Discover How is a Satellite Launched into an Orbit? Warning: You are allowed to steal any contents of this material with or without notifying the authors. 5
  • 6. HACKING SATELLITE: A New Universe to Discover Satellite Internet Services • Used in locations where terrestrial Internet access is not available and in locations which move frequently, e.g. vessels at sea and war zone. • Can be used where the most basic utilities are lacking, require a generator or battery power supply that can produce enough electricity. Warning: You are allowed to steal any contents of this material with or without notifying the authors. 6
  • 7. HACKING SATELLITE: A New Universe to Discover Three Types of Satellite Internet Services • One-way multicast: used for IP multicast-based data, audio and video distribution. Most Internet protocols will not work correctly over one-way access, since they require a return channel. • One-way with terrestrial return: used with traditional dial-up access to the Internet, with outbound data travelling through a telephone modem, but downloads are sent via satellite at a speed near that of broadband Internet access. • Two-way satellite access: allows upload and download data communications. Warning: You are allowed to steal any contents of this material with or without notifying the authors. 7
  • 8. HACKING SATELLITE: A New Universe to Discover Very Small Aperture Terminal (VSAT) • Two-way satellite ground station with a dish antenna that is smaller than 3 metres. • Nearly all VSAT systems are now based on IP, with a very broad spectrum of applications. • Most commonly used interactive and transactional application (online communication between head office and branches, flight ticket and hotel reservation, ATM (Automated Teller Machine) and small data traffic) and terminal application with centralised database (data entry, inventory control and payment point) Warning: You are allowed to steal any contents of this material with or without notifying the authors. 8
  • 9. HACKING SATELLITE: A New Universe to Discover Warning: You are allowed to steal any contents of this material with or without notifying the authors. 9
  • 10. HACKING SATELLITE: A New Universe to Discover Internal Computer (TT&C) Body Power source Attitude control Grapple Fixture Communications Satellite Anatomy Warning: You are allowed to steal any contents of this material with or without notifying the authors. 10
  • 11. HACKING SATELLITE: A New Universe to Discover The Control Centre Warning: You are allowed to steal any contents of this material with or without notifying the authors. 11
  • 12. HACKING SATELLITE: A New Universe to Discover Tracking, Telemetry and Command Station Warning: You are allowed to steal any contents of this material with or without notifying the authors. 12
  • 13. HACKING SATELLITE: A New Universe to Discover Topologies of VSAT • A star topology, using a central uplink site, such as a network operations centre (NOC), to transport data back and forth to each VSAT terminal via satellite, • A mesh topology, where each VSAT terminal relays data via satellite to another terminal by acting as a hub, minimising the need for a centralised uplink site, • and a combination of both star and mesh topologies. Warning: You are allowed to steal any contents of this material with or without notifying the authors. 13
  • 14. HACKING SATELLITE: A New Universe to Discover Satellite Footprint • The footprint of a satellite is the ground area that its transponders cover, and determines the satellite dish diameter required to receive each transponder's signal. • There is usually a different map for each transponder (or group of transponders) as each may be aimed to cover different areas of the ground. • Footprint maps usually show either the estimated minimal satellite dish diameter required, or the signal strength in each area measured in dBW. Warning: You are allowed to steal any contents of this material with or without notifying the authors. 14
  • 15. 100º E - 145.9ºHACKING SATELLITE: A New Universe to Discover E (SE Asia, Australia, China, Japan, Korea) Satellite Name Position HD TV TV Digital TV Analog Radio Digital Radio Analog Data ASIASAT 2 100.5º East 0 97 0 51 0 4 EXPRESS A2 103.0º East 0 13 0 12 0 2 ASIASAT 3S 105.5º East 0 258 0 56 0 22 CAKRAWARTA 1 107.7º East 0 70 0 19 0 5 TELKOM 1 108.0º East 0 57 0 0 0 4 AAP 1 108.2º East 0 57 0 0 0 17 BSAT 1A, 2A 110.0º East 10 3 4 14 0 0 JCSAT 110 110.0º East 0 63 0 20 0 0 SINOSAT 1 110.5º East 0 59 0 36 0 4 PALAPA C2 113.0º East 0 31 2 4 0 8 KOREASAT 2 113.0º East 0 48 0 0 0 3 KOREASAT 3 116.0º East 0 125 0 1 0 12 TELKOM 2 118.0º East 0 1 0 0 0 0 THAICOM 1A 120.0º East 0 6 0 1 0 0 ASIASAT 4 122.0º East 0 79 0 1 0 17 JCSAT 4A 124.0º East 0 93 0 0 0 7 JCSAT 3 128.0º East 0 142 0 103 0 21 JCSAT 5A 132.0º East 0 2 0 0 0 0 APSTAR 6 134.0º East 0 46 2 55 0 3 APSTAR V / TELSTAR 18 138.0º East 0 151 0 0 0 2 EXPRESS AM3 140.0º East 0 14 0 8 0 1 SUPERBIRD C 144.0º East 0 57 0 4 0 0 source: http://www.satcodx4.com/eng/ accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 15
  • 16. HACKING SATELLITE: A New Universe to Discover Warning: You are allowed to steal any contents of this material with or without notifying the authors. 16
  • 17. HACKING SATELLITE: A New Universe to Discover Warning: You are allowed to steal any contents of this material with or without notifying the authors. 17
  • 18. HACKING SATELLITE: A New Universe to Discover Warning: You are allowed to steal any contents of this material with or without notifying the authors. 18
  • 19. HACKING SATELLITE: A New Universe to Discover MEASAT-1 @ 91.5º East Warning: You are allowed to steal any contents of this material with or without notifying the authors. 19
  • 20. HACKING SATELLITE: A New Universe to Discover PALAPA C2 @ 113.0º East Warning: You are allowed to steal any contents of this material with or without notifying the authors. 20
  • 21. HACKING SATELLITE: A New Universe to Discover TELKOM 1 @ 108.0º East Warning: You are allowed to steal any contents of this material with or without notifying the authors. 21
  • 22. HACKING SATELLITE: A New Universe to Discover TELKOM 2 @ 118.0º East Warning: You are allowed to steal any contents of this material with or without notifying the authors. 22
  • 23. HACKING SATELLITE: A New Universe to Discover Attacks against Satellite Systems It’s politically sensitive, but it’s going to happen. Some people don’t want to hear this, and it sure isn’t in vogue … but—absolutely—we’re going to fight in space. We’re going to fight from space and we’re going to fight into space… General Joseph W. Ashy Former Commander in Chief U.S. Space Command source: http://www.au.af.mil/au/awc/awcgate/saas/spacy_wl.pdf accessed on 21 September 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 23
  • 24. HACKING SATELLITE: A New Universe to Discover Hypothetical Attacks against Satellite Systems Warning: You are allowed to steal any contents of this material with or without notifying the authors. 24
  • 25. HACKING SATELLITE: A New Universe to Discover Denial of Service Attacks • Jam uplink and downlink • White noise at frequency. • Requires directed antenna. • Requires very low power. • Difficult to detect, especially if occurring at irregular intervals. source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 25
  • 26. HACKING SATELLITE: A New Universe to Discover Denial of Service Attacks • Overpower uplink • Can be done with transportable satellite ground terminals • In tri-band (C-band, X-band, and Ku-band). • Power limited. • Uplink equipment now contains ID coding. source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 26
  • 27. HACKING SATELLITE: A New Universe to Discover Orbital Positioning Attacks • Ranging transponder spoofing • Multiple ground stations triangulate satellite position using a series of tones sent to a transponder. • Ground stations observe phase differentials. • Ground or airborne spoofer could transmit false response, resulting in incorrect orbit determination. source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 27
  • 28. HACKING SATELLITE: A New Universe to Discover Orbital Positioning Attacks • Direct commanding • Preparation and delivery of telecommand queue. • Command replay • Record outbound telecommand queue from TT&C facility. Replay later to initiate duplicate action. source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 28
  • 29. HACKING SATELLITE: A New Universe to Discover Orbital Positioning Attacks • Insertion after confirmation but prior to execution • SCC formulates telecommand queue and sends to TT&C. • TT&C uplinks and receives readback, which it returns to SCC. • If readback is correct, SCC waits for proper time to execute. • Channel is vulnerable to update during this period — new telecommand queue may be uploaded prior to authenticated execute. source: http://www.decodesystems.com/attacks.html accessed on 28 August 2006 Warning: You are allowed to steal any contents of this material with or without notifying the authors. 29
  • 30. HACKING SATELLITE: A New Universe to Discover Practical Attacks against Satellite Systems Warning: You are allowed to steal any contents of this material with or without notifying the authors. 30
  • 31. HACKING SATELLITE: A New Universe to Discover Satellite Piggyjacking: Compromise Network Layer Warning: You are allowed to steal any contents of this material with or without notifying the authors. 31
  • 32. HACKING SATELLITE: A New Universe to Discover Compromise Network Layer: • Selecting Target • Pointing Antenna • Find “free” Frequency • Trasmit and Receive • Detection Evasion Warning: You are allowed to steal any contents of this material with or without notifying the authors. 32
  • 33. HACKING SATELLITE: A New Universe to Discover • DEMO Warning: You are allowed to steal any contents of this material with or without notifying the authors. 33
  • 34. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Warning: You are allowed to steal any contents of this material with or without notifying the authors. 34
  • 35. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Warning: You are allowed to steal any contents of this material with or without notifying the authors. 35
  • 36. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Warning: You are allowed to steal any contents of this material with or without notifying the authors. 35
  • 37. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Real User Warning: You are allowed to steal any contents of this material with or without notifying the authors. 35
  • 38. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Real User Warning: You are allowed to steal any contents of this material with or without notifying the authors. 36
  • 39. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Real User Us Warning: You are allowed to steal any contents of this material with or without notifying the authors. 36
  • 40. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Real User Us Warning: You are allowed to steal any contents of this material with or without notifying the authors. 37
  • 41. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Real User Us Warning: You are allowed to steal any contents of this material with or without notifying the authors. 38
  • 42. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Us Warning: You are allowed to steal any contents of this material with or without notifying the authors. 38
  • 43. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Us Warning: You are allowed to steal any contents of this material with or without notifying the authors. 39
  • 44. HACKING SATELLITE: A New Universe to Discover Rogue Carrier Detection Evasion Allocated Frequency Warning: You are allowed to steal any contents of this material with or without notifying the authors. 40
  • 45. HACKING SATELLITE: A New Universe to Discover Hijacking DVB Connection: Compromise Data Link Layer Warning: You are allowed to steal any contents of this material with or without notifying the authors. 41
  • 46. HACKING SATELLITE: A New Universe to Discover Compromise Data Link Layer: • Selecting Target • Pointing Antenna • Find Interesting Carrier • Scanning MAC Address • Scanning Free IP Address • Viola! Warning: You are allowed to steal any contents of this material with or without notifying the authors. 42
  • 47. HACKING SATELLITE: A New Universe to Discover • DEMO Warning: You are allowed to steal any contents of this material with or without notifying the authors. 43
  • 48. HACKING SATELLITE: A New Universe to Discover • DISCUSSION Warning: You are allowed to steal any contents of this material with or without notifying the authors. 44