DEF CON China Party 2021 - Whispers Among the Stars - James Pavur
Space is changing. More than 15,000 satellites are expected in orbit by 2030, the majority for internet communications. This updated briefing from DEF CON 28 shows how an attacker, using $300 of widely available home television equipment, can intercept deeply sensitive data transmitted by satellite services belonging to some of the world's largest organizations.
In this talk, we will touch on a series of case studies looking at intercepted satellite internet traffic from three domains: air, land, and sea. From oil tankers to wind farms, we'll see how satellite eavesdropping attacks can threaten the privacy and security of critical systems and how, under certain conditions, attackers can abuse their eavesdropping position to even hijack and alter traffic.
The talk concludes by presenting open-source tools we have developed to help researchers interested in working on these problems: including a proof-of-concept exploit which has been made publicly available in the months following DEF CON 28. We'll also touch on the work we've done to help mitigate these vulnerabilities, namely an open-source secure satellite communications research testbed and proxy. Finally, we will talk about new research directions that may be of interest to others looking to make contributions on satellite communications security.
While this talk includes technical components, it assumes no prior background in satellite communications or cryptography.
Видео DEF CON China Party 2021 - Whispers Among the Stars - James Pavur канала DEFCONConference
In this talk, we will touch on a series of case studies looking at intercepted satellite internet traffic from three domains: air, land, and sea. From oil tankers to wind farms, we'll see how satellite eavesdropping attacks can threaten the privacy and security of critical systems and how, under certain conditions, attackers can abuse their eavesdropping position to even hijack and alter traffic.
The talk concludes by presenting open-source tools we have developed to help researchers interested in working on these problems: including a proof-of-concept exploit which has been made publicly available in the months following DEF CON 28. We'll also touch on the work we've done to help mitigate these vulnerabilities, namely an open-source secure satellite communications research testbed and proxy. Finally, we will talk about new research directions that may be of interest to others looking to make contributions on satellite communications security.
While this talk includes technical components, it assumes no prior background in satellite communications or cryptography.
Видео DEF CON China Party 2021 - Whispers Among the Stars - James Pavur канала DEFCONConference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![DEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on Twitter](https://i.ytimg.com/vi/iAOOdYsK7MM/default.jpg)
![](https://i.ytimg.com/vi/wZnUlmc8_x8/default.jpg)
![How the Best Hackers Learn Their Craft](https://i.ytimg.com/vi/6vj96QetfTg/default.jpg)
![BSIDES CPT 2019 - Hacking satellites with Software Defined Radio (SDR) - Gerard de Jong](https://i.ytimg.com/vi/gMwciWchH3Q/default.jpg)
![Defcon 21 - The Secret Life of SIM Cards](https://i.ytimg.com/vi/31D94QOo2gY/default.jpg)
![Nina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 Conference](https://i.ytimg.com/vi/2IT2oAzTcvU/default.jpg)
![DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit](https://i.ytimg.com/vi/BHqrA8lzz2o/default.jpg)
![DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots](https://i.ytimg.com/vi/v9vIcfLrmiA/default.jpg)
![DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity](https://i.ytimg.com/vi/UawS3_iuHoA/default.jpg)
![DEF CON 26 - m010ch - Please Do Not Duplicate Attacking the Knox Box](https://i.ytimg.com/vi/f4rPDF993qs/default.jpg)
![DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering](https://i.ytimg.com/vi/HlUe0TUHOIc/default.jpg)
![DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking](https://i.ytimg.com/vi/2aBXpho5b7w/default.jpg)
![DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity](https://i.ytimg.com/vi/gmgV4r25XxA/default.jpg)
![DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy: From TIA to Google](https://i.ytimg.com/vi/DoeNbZlxfUM/default.jpg)
![DEF CON 24 - Backdooring the Frontdoor](https://i.ytimg.com/vi/oBTl-jCtNDA/default.jpg)
![DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks](https://i.ytimg.com/vi/GhUUzGBjhXQ/default.jpg)
![DEF CON 29 Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer](https://i.ytimg.com/vi/-btN8T6WvYg/default.jpg)
![Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference](https://i.ytimg.com/vi/pq9t0VEIMio/default.jpg)
![DEF CON 18 - Barnaby Jack - Jackpotting Automated Teller Machines Redux](https://i.ytimg.com/vi/FkteGFfvwJ0/default.jpg)
![DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing](https://i.ytimg.com/vi/RoOqznZUClI/default.jpg)