Satellite Hacking 101
Satellite Hacking 101
angelinatsuboi.com | G4LXY.space
MAIN OBJECTIVES
Artificial Satellites
What are Satellites Used For?
Satellites are used for a wide range of scientific and technical applications
They can be categorized down into four categories:
● Communication
Includes a transponder to receive and send signals from Earth allowing for long-range
communication. Used in media transmission such as radio, TV, Internet, and telephone
● Remote Sensing
Monitor and track information about Earth such as environmental patterns. weather
forecasting, geographical mapping, and more
● Navigation
Sends telemetry data including position in space and time. Used for geolocation
purposes such as GNSS
● Astronomical
Giant telescope in orbit. Uses infrared imaging to investigate different types of celestial
bodies for astronomical research purposes
The Rising Threat
The space industry is growing significantly annually due to the reduced
financial barrier to entry and growing accessibility of space-related
technology. However, this growth is met in tandem with bad actors trying
to exploit this tech to compromise satellites and other spacecraft.
One example of this occurred in 1998 when a team of hackers took control
of the U.S.-German ROSAT X-Ray satellite and instructed it to adjust its
satellite panels to aim towards the sun by hacking into the computers in
the Goddard Space Flight Center which fried the satellite’s batteries and
caused it to crash into Earth in 2011.
ATTACK PROCESS
Track the sat
Communication
Eavesdropping
Listen to the sat
Exploitation of Vulnerabilities
and Attacking
Hack the sat
Satellite Reconnaissance
What information can you extract from a satellite?
Satellite Identification:
Type of satellite, company / organization affiliation, name, launch date, operator., passes, location. etc
Orbital Parameters:
Precise telemetry of satellite such as altitude, eccentricity, inclination, orbital period, etc
Satellite Imagery:
Extract images from satellites for infrastructure, environmental, and remote sensing analysis
Orbital Parameters:
Precise telemetry of satellite such as altitude, eccentricity, inclination, orbital period, etc
Satellite Imagery:
Extract images from satellites for infrastructure, environmental, and remote sensing analysis
e: eccentricity
i: inclination
ω: argument of periapsis
orbitalmechanics.info
Step 3 - Visualize the ISS in Orbit
Note the 6 Keplerian Elements:
Measured by frequency and wavelength. Satellites use radio waves to receive and send
signals to and from Earth
Frequency and Bands
SATCOM - Satellite Communication
SATCOM (Satellite Communication) is a network architecture used by satellites to provide a variety of
applications from broadband internet, mobile television, and radio broadcasts
Communication links involve frequencies in the L-band with the range 1 to 2 GHz range
Problems with SATCOM
Technical Issues for Universal Encryption:
Since satellite signals travel extensive distances, they are at risk of packet loss and latency which causes massive
performance reductions for end-to-end encryption
Decoder Software
Wxtoimg, Gqrx, Sox
Bandwidth to 36 KHz
Spoofing:
Transmitting a counterfeit radio signal to a receiver to override a legitimate satellite signal
Eavesdropping:
Accessing private data from a satellite by intercepting communication and deciphering communication
Decryption Software:
SkyGrabber is only $24
Common Attack Strategies
Counterfeit Signals for Spoofing
GPS Spoofing - Transmitting a fake signal to a receiver antenna to
override a valid GPS signal
Clever Eavesdropping:
Intercepting the frequencies with RF analyzers and decrypting
comms
Let’s Simulate Spoofing GNSS
Signals!
Objective: Create a believable GNSS data signal and simulate it!
What is GNSS Spoofing?
GNSS: Global Navigation Satellite System. Used to pin-point a location on Earth
GPS Spoofing: When a person alters data sent to satellite in order to appear in a different
location and time zone.
Ephemeral Positioning
Ephemeris: position of a celestial body in space
● Easy installation
● Network Security
Network systems including more robust encryptors, diodes, and
gateways to protect data through transit that cover multiple layers
of security
● Threat Monitoring
Development of more modern detection systems for cyber threat
intelligence and more supervision of cyber systems in space
Future of Satellite Cybersecurity