Slide 1

Slide 1 text

2.0 Exploiting Satellite Trust Relationship Jim Geovedi [email protected] Raditya Iryandi [email protected] Hacking a Bird in the Sky Anthony Zboralski [email protected]

Slide 2

Slide 2 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Disclaimer This presentation is intended to demonstrate the inherent security, design and configuration flaws in publicly accessible satellite communication networks and promote the use of safer satellite communication systems. Viewers and readers are responsible for their own actions and strongly encourage to behave themselves.

Slide 3

Slide 3 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Slanguage Dictionary ‣ Bird: a variety term for satellite; "The proposed channel would be carried by an Asian bird to be launched next spring."

Slide 4

Slide 4 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite ‣ A satellite is any object that orbits another object (which known as its primary).

Slide 5

Slide 5 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Artificial Satellite ‣ It was the English sci‐fi writer Arthur C. Clarke who conceived the possibility of artificial communication satellites in 1945. Clarke examined the logistics of satellite launch, possible orbits and other aspects. Arthur C. Clarke, science fiction author, meeting with fans, at his home office in Colombo, Sri Lanka. source: http://en.wikipedia.org/wiki/Arthur_C._Clarke

Slide 6

Slide 6 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Artificial Satellite ‣ The first artificial satellite was Sputnik 1 launched by Soviet Union on 4 October 1957. In 1957, the Soviet Union launched Sputnik, a basketball‐size capsule that became the Earth’s first man‐made satellite. Sputnik’s radio signals were a “raspberry” from the Soviets, fumed one U.S. pundit. The next year, the United States created NASA, and the space race was under way. source: http://magma.nationalgeographic.com/ngm/2007‐10/space‐travel/space‐travel‐photography.html

Slide 7

Slide 7 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Internet Services ‣ One‐way multicast: used for IP multicast‐based data, audio and video distribution. ‣ Most Internet protocols will not work correctly over one‐way access, since they require a return channel. ‣ One‐way with terrestrial return: used with traditional dial‐up access to the Internet, but downloads are sent via satellite at a speed near that of broadband Internet access. ‣ Two‐way satellite access: allows upload and download data communications.

Slide 8

Slide 8 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Very Small Aperture Terminal ‣ A one or two‐way terminal used in a star, mesh or point to point network with. Antenna size is restricted to being less than or equal to 3.8 m at Ku band and 7.8 m at C band. ‣ It consists of a large high performance hub earth station (with an antenna of up to 9 m in diameter) and a large number of smaller, lower performance terminals. These small terminals can be receive only, transmit only or transmit/receive. A 2.5m parabolic dish antenna for bidirectional high‐speed satellite Internet. source: http://en.wikipedia.org/wiki/VSAT

Slide 9

Slide 9 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Frequency Band Designations SHF EHF 8 GHz 12 GHz 18 GHz 40 GHz 75 GHz 30 GHz 3 GHz C X Ku K V Ka S L UHF VHF 3 GHz UHF 1 GHz 300 MHz VHF source: http://www.satcom‐services.com/sat_freq.htm

Slide 10

Slide 10 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Data communication service using satellite access media with Time Division Multiplex (TDM) / Time Division Multiple Access (TDMA) technology based on Internet‐protocol. source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatIP/tabid/85/Default.aspx

Slide 11

Slide 11 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Data communication service using satellite access media with Single Channel per Carrier (SCPC) connecting point‐to‐point and point‐to‐multipoint. source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatLink/tabid/86/Default.aspx

Slide 12

Slide 12 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Attacks against Satellite Systems ‣ Hypothetical Attacks ‣ Denial of services (uplink/downlink jamming, overpower uplink), orbital positioning attacks (raging transponder spoofing, direct commanding, command replay, insertion after confirmation but prior to execution) ‣ Practical Attacks

Slide 13

Slide 13 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008

Slide 14

Slide 14 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Abusing Satellite Systems "Satellite Piggyjacking" (Exploiting Satellite Trust Relationship on VSAT Network)

Slide 15

Slide 15 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008

Slide 16

Slide 16 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking

Slide 17

Slide 17 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking ‣ Selecting target

Slide 18

Slide 18 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking ‣ Selecting target ‣ Pointing antenna

Slide 19

Slide 19 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking ‣ Selecting target ‣ Pointing antenna ‣ Find "free" frequency

Slide 20

Slide 20 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking ‣ Selecting target ‣ Pointing antenna ‣ Find "free" frequency ‣ Transmit and receive

Slide 21

Slide 21 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Satellite Piggyjacking ‣ Selecting target ‣ Pointing antenna ‣ Find "free" frequency ‣ Transmit and receive ‣ Detection evasion

Slide 22

Slide 22 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Demo

Slide 23

Slide 23 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion

Slide 24

Slide 24 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency

Slide 25

Slide 25 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Real User

Slide 26

Slide 26 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Real User

Slide 27

Slide 27 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Real User Us

Slide 28

Slide 28 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Us Real User

Slide 29

Slide 29 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Us Real User

Slide 30

Slide 30 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Us

Slide 31

Slide 31 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Us

Slide 32

Slide 32 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency Us

Slide 33

Slide 33 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Rogue Carrier Detection Evasion Allocated Frequency

Slide 34

Slide 34 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 Detection Issues ‣ Require at least another satellite and satellite operator to detect rogue carrier (similar to GPS mechanism). ‣ Satellite operator alliance co‐operation. ‣ Specialised company detecting rogue carrier. ‣ Hard to detect if rogue carrier has ability to switch frequency automatically prior detection.

Slide 35

Slide 35 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 The End ‣ Last year, we managed to present how to compromise data link layer. ‣ Today, we present how to compromise network layer.

Slide 36

Slide 36 text

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship Hack In The Box Security Conference 2008 The End ‣ Last year, we managed to present how to compromise data link layer. ‣ Today, we present how to compromise network layer. Data Link + Network = ?