SlideShare a Scribd company logo
2.0
Hacking
a
Bird
in
the
Sky
Exploiting
Satellite
Trust
Relationship
    Jim
Geovedi             Raditya
Iryandi
  jim.geovedi@bellua.com   raditya.iryandi@bellua.com
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                           Disclaimer
This presentation is intended to demonstrate the inherent security, 
design and configuration flaws in publicly accessible satellite 
communication networks and promote the use of safer satellite 
communication systems. Viewers and readers are responsible for their 
own actions and strongly encourage to behave themselves. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Slanguage
Dictionary
   ‣ Bird: a variety term for satellite; "The proposed 
     channel would be carried by an Asian bird to be 
     launched next spring."
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               Satellite
   ‣ A satellite is any
object
that
orbits
another
object 
     (which known as its primary).
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                           HITBSecConf Dubai 2008




                               Artificial
Satellite
   ‣ It was the English sci‐fi writer 
     Arthur C. Clarke who 
     conceived the
possibility
of

     artificial
communication

     satellites in 1945. Clarke 
     examined the logistics of 
     satellite launch, possible 
     orbits and other aspects.
                                                                     Arthur C. Clarke, science fiction author, meeting with 
                                                                        fans, at his home office in Colombo, Sri Lanka.
                                                                     source: http://en.wikipedia.org/wiki/Arthur_C._Clarke
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                    HITBSecConf Dubai 2008




                                    Artificial
Satellite
   ‣ The first artificial satellite 
     was Sputnik
1 launched 
     by Soviet Union on 
     4 October 1957.

       In 1957, the Soviet Union launched Sputnik, a basketball‐size capsule that became the Earth’s first man‐made satellite. Sputnik’s radio signals 
      were a “raspberry” from the Soviets, fumed one U.S. pundit. The next year, the United States created NASA, and the space race was under way.
                          source: http://magma.nationalgeographic.com/ngm/2007‐10/space‐travel/space‐travel‐photography.html
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008



                Satellite
Internet
Services
   ‣ One‐way
multicast: used for IP multicast‐based data, 
     audio and video distribution. 
        ‣ Most Internet protocols will not work correctly over 
          one‐way access, since they require a return channel. 
   ‣ One‐way
with
terrestrial
return: used with traditional 
     dial‐up access to the Internet, but downloads are sent via 
     satellite at a speed near that of broadband Internet  
     access.
   ‣ Two‐way
satellite
access: allows upload and download 
     data communications. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship             HITBSecConf Dubai 2008




         Very
Small
Aperture
Terminal
   ‣ A one or two‐way terminal used in 
     a star, mesh or point to point network 
     with. Antenna size is restricted to 
     being less than or equal to 3.8 m at 
     Ku band and 7.8 m at C band.
   ‣ It consists of a large high performance 
     hub earth station (with an antenna of 
     up to 9 m in diameter) and a large 
     number of smaller, lower performance 
     terminals. These small terminals can 
     be receive only, transmit only or 
     transmit/receive.                                                    A 2.5m parabolic dish antenna for 
                                                                     bidirectional high‐speed satellite Internet.
                                                                     source: http://en.wikipedia.org/wiki/VSAT
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                          HITBSecConf Dubai 2008




        Frequency
Band
Designations
                                               300 MHz                                                          3 GHz

                              VHF                                             UHF
                                                                     1 GHz




                             VHF                                   UHF                            L            S



           3 GHz                                                                              30 GHz

                                                SHF                                                     EHF
                             8 GHz              12 GHz               18 GHz                        40 GHz       75 GHz




                      C                 X                  Ku                   K             Ka              V




                                        source: http://www.satcom‐services.com/sat_freq.htm
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                  HITBSecConf Dubai 2008




               Data communication service using satellite access media with Time Division Multiplex (TDM) / Time Division Multiple 
                                           Access (TDMA) technology based on Internet‐protocol.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatIP/tabid/85/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                HITBSecConf Dubai 2008




                        Data communication service using satellite access media with Single Channel per Carrier (SCPC) 
                                             connecting point‐to‐point and point‐to‐multipoint.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatLink/tabid/86/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship    HITBSecConf Dubai 2008




   Attacks
against
Satellite
Systems
   ‣ Hypothetical Attacks
        ‣      Denial of services (uplink/downlink jamming, overpower uplink), orbital 
               positioning attacks (raging transponder spoofing, direct commanding, 
               command replay, insertion after confirmation but prior to execution)

   ‣ Practical Attacks
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




               Abusing
Satellite
Systems


                         "Satellite Piggyjacking"
               (Exploiting Satellite Trust Relationship on VSAT Network)
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Satellite
Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find "free" frequency
   ‣ Transmit and receive
   ‣ Detection evasion
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                                   Demo
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                Detection
Issues
   ‣ Require at least another satellite and satellite 
      operator to detect rogue carrier (similar to GPS 
      mechanism).
     ‣ Satellite operator alliance co‐operation.
        ‣ Specialised company detecting rogue carrier.
   ‣ Hard to detect if rogue carrier has ability to 
     switch frequency automatically prior detection.
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               The
End
   ‣ Two years ago, we presented how to 
     compromise data link layer.
   ‣ Today, we present how to compromise network 
     layer.


                      Data
Link
+
Network
=
?

More Related Content

PDF
Hacking a Bird in the Sky: Hijacking VSAT Connection
PDF
Hacking Satellite: A New Universe to Discover
PDF
Hacking a Bird in the Sky
PDF
IPV9人类共同的理想/IPv9 - The common ideal for human being
PPT
The Coming Revolution in Environmental Awareness
PPT
A Gigabit in Every Home—The Emergence of True Broadband
PDF
IEEE Computer Society Phoenix Chapter - Satellite Telecommunications & Earth ...
PPT
High Performance Collaboration – The Jump to Light Speed
Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking Satellite: A New Universe to Discover
Hacking a Bird in the Sky
IPV9人类共同的理想/IPv9 - The common ideal for human being
The Coming Revolution in Environmental Awareness
A Gigabit in Every Home—The Emergence of True Broadband
IEEE Computer Society Phoenix Chapter - Satellite Telecommunications & Earth ...
High Performance Collaboration – The Jump to Light Speed

Similar to Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship (20)

PPTX
UAV CATEGORIES CLASSIFICATION, TYPES USES
PPT
Bringing Mexico Into the Global LambdaGrid
PPT
OptIPlanet Collaboratory
PPT
OptIPlanet Collaboratory
PPT
How Global-Scale Personal Lighwaves are Transforming Scientific Research
PPT
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
PPT
How Global-Scale Personal Lightwaves are Transforming Scientific Research
PDF
IRJET- A Survey of Underwater Communication
PPT
Blowing up the Box--the Emergence of the Planetary Computer
PDF
BSides Canberra 2018: A low cost guide to satellite listening
PPT
Is it Live or is it Telepresence?
PPT
How Fiber Optics are Transforming our World
PPT
Small Ku Band Phased Array Anteena System
PPT
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
PPT
Experiments in Living in the Virtual/Physical World
PPT
Towards Telepresence
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
2010
PPT
Envisioning the Future
PDF
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
UAV CATEGORIES CLASSIFICATION, TYPES USES
Bringing Mexico Into the Global LambdaGrid
OptIPlanet Collaboratory
OptIPlanet Collaboratory
How Global-Scale Personal Lighwaves are Transforming Scientific Research
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
How Global-Scale Personal Lightwaves are Transforming Scientific Research
IRJET- A Survey of Underwater Communication
Blowing up the Box--the Emergence of the Planetary Computer
BSides Canberra 2018: A low cost guide to satellite listening
Is it Live or is it Telepresence?
How Fiber Optics are Transforming our World
Small Ku Band Phased Array Anteena System
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
Experiments in Living in the Virtual/Physical World
Towards Telepresence
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
2010
Envisioning the Future
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi

More from Jim Geovedi (20)

PDF
Waluku: Answering Astronomy Questions through Social Media
PDF
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
PDF
Satellite Hacking — Intro by Indianz (2012)
PDF
Internet Worms
PDF
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
PDF
Cheating the 10,000 hour rule
PDF
Professional Hackers
PDF
AI & NLP pada @begobet
PDF
IDS & Log Management
PDF
Satellite Telephony Security
PDF
Hacking a Bird in the Sky: The Revenge of Angry Birds
PDF
Warezzman - DVB-Satellite Hacking
PDF
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
PDF
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
PDF
Is Cyber-offence the New Cyber-defence?
PDF
The 21st Century Bank Job
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
Hacking Cracking 2008
PDF
Wireless Hotspot Security
PDF
Wireless Hotspot: The Hackers Playground
Waluku: Answering Astronomy Questions through Social Media
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Satellite Hacking — Intro by Indianz (2012)
Internet Worms
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
Cheating the 10,000 hour rule
Professional Hackers
AI & NLP pada @begobet
IDS & Log Management
Satellite Telephony Security
Hacking a Bird in the Sky: The Revenge of Angry Birds
Warezzman - DVB-Satellite Hacking
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Is Cyber-offence the New Cyber-defence?
The 21st Century Bank Job
Cloud Security - Security Aspects of Cloud Computing
Hacking Cracking 2008
Wireless Hotspot Security
Wireless Hotspot: The Hackers Playground

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship