0% found this document useful (0 votes)
28 views17 pages

Satellite Network Hacking & Security Seminar

Uploaded by

C programming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views17 pages

Satellite Network Hacking & Security Seminar

Uploaded by

C programming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

RAJIV GANDHI INSTITUTE OF

TECHNOLOGY

Department of Computer Science & Engineering

Satellite Network Hacking &


Security Analysis
UNDER THE GUIDANCE OF
Mrs.Rajani Kodagali, Asst. Prof
Computer Science

Presented By
SUHAS K SHETTY [1RG17CS050]
ABSTRACT
• Satellites play a significant role in communication, early
warning systems, global broadcasting, meteorology,
navigation, reconnaissance and surveillance.
• Satellites are strategic asset for any country and are
considered “critical infrastructure”
• However, space technology has been largely overlooked
by the security point of view
• Therefore they are considerable as privileged targets for
a possible cyber attack.
INTRODUCTION
• Satellites play a crucial • Take a look into:
role in our contemporary • satellite network security
society. • satellite network treats
• They are used in both and security analysis,
private and public sectors • satellite network
for numerous vulnerabilities,
purposes,from research to • satellite network hacking
communication.
• Unfortunately, with the
diffusion of this complex
system, the interest of
governments and hackers
also increased.
How Does A Satellite Work ?
Satellite Threat Actors
Attacker Type Example Motivation Techinal Capability
National Military Space Control High
Anti-Satellite Weapons
State Intelligence Counter-Intelligence High
Technology Theft
Eavesdropping
Industry Insiders Sabotage High
Espionage
Organized Crime Eavesdropping Moderate
Ransom
Technology Theft
Commercial Competitors Sabotage Moderate
Technology Theft
Terrorists Soceital Harm Low
Message Broadcasting
Individuals Personal Challenge Low
How to go about doing so
• Attacking the • Attacking satellite
satellites ground stations
themselves • e.g. via traditional
• e.g. via control network intrusion
system exploitation
Types of Attacks

There are just too many...


Jamming
• It’s a form of electronic anti-satellite attack that interferes
with satellite communication.
• Doesn’t physically damage the satellite
• Types: uplink jamming and downlink jamming
Eavesdropping Attacks
• Signals from GEO satellites ecompass an entire
continent, due to this vast ness the attacker could be any
where, and is capable of receiving the transmission.
• How ?. By using cheap satellite dish and software
defined radios .
• Satellites have weak encryption system.
• Satellites are resource constrained and subjected to
harsh orbital environment.
Spoofing
• Commonly seen in media
broadcast (satellilte TV) .
• Achieved by replacing the
victims uplink signal with
a more powerful malicious
radio transmission.
• Lack of on-board
verification of incoming
signals.
Spoofing of Global Navigation
Satellite System (GNSS)
• Targets terrestrial system
and involve directiong a
false simulated GNSS
signal.
• Defense against GNSS:
• use of accelerometer.
• spectrum anomaly
detection to detect
spoofed transmission and
much more.
How do I get into hacking a
satellite ?
All the stuff you need...
Hardware Software
• Free Scanner
Software:
– Crazy Scan
– Blind Scan
Satellite Dish
• Download data
– TSReader
– PROG DVB

DVB Tuner Card


Legally
Conclusion
• “Security through Obscurity”
• Satellites are an increasingly vital component of modern
life and their security represents a key point of failure in
systems ranging from military communications to
meteorological forecasting.
• The intersection between outer space and cyberspace
remains poorly understood - with important contributions
scattered across diverse and isolated disciplines.
References
• [1] Satellite Network Hacking & Security Analysis
– By: Adam Ali.Zare Hudaib

• [2] SOK: Building a Launchpad for Impactful Satellite


Cyber-Security Research
– arXiv:2010.10872v1 [cs.CR] 21 Oct 2020
THANK YOU !!!

Happy Hacking

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy