SlideShare a Scribd company logo
2.0
Hacking
a
Bird
in
the
Sky
Exploiting
Satellite
Trust
Relationship
    Jim
Geovedi             Raditya
Iryandi
  jim.geovedi@bellua.com   raditya.iryandi@bellua.com
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                           Disclaimer
This presentation is intended to demonstrate the inherent security, 
design and configuration flaws in publicly accessible satellite 
communication networks and promote the use of safer satellite 
communication systems. Viewers and readers are responsible for their 
own actions and strongly encourage to behave themselves. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Slanguage
Dictionary
   ‣ Bird: a variety term for satellite; "The proposed 
     channel would be carried by an Asian bird to be 
     launched next spring."
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               Satellite
   ‣ A satellite is any
object
that
orbits
another
object 
     (which known as its primary).
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                           HITBSecConf Dubai 2008




                               Artificial
Satellite
   ‣ It was the English sci‐fi writer 
     Arthur C. Clarke who 
     conceived the
possibility
of

     artificial
communication

     satellites in 1945. Clarke 
     examined the logistics of 
     satellite launch, possible 
     orbits and other aspects.
                                                                     Arthur C. Clarke, science fiction author, meeting with 
                                                                        fans, at his home office in Colombo, Sri Lanka.
                                                                     source: http://en.wikipedia.org/wiki/Arthur_C._Clarke
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                    HITBSecConf Dubai 2008




                                    Artificial
Satellite
   ‣ The first artificial satellite 
     was Sputnik
1 launched 
     by Soviet Union on 
     4 October 1957.

       In 1957, the Soviet Union launched Sputnik, a basketball‐size capsule that became the Earth’s first man‐made satellite. Sputnik’s radio signals 
      were a “raspberry” from the Soviets, fumed one U.S. pundit. The next year, the United States created NASA, and the space race was under way.
                          source: http://magma.nationalgeographic.com/ngm/2007‐10/space‐travel/space‐travel‐photography.html
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008



                Satellite
Internet
Services
   ‣ One‐way
multicast: used for IP multicast‐based data, 
     audio and video distribution. 
        ‣ Most Internet protocols will not work correctly over 
          one‐way access, since they require a return channel. 
   ‣ One‐way
with
terrestrial
return: used with traditional 
     dial‐up access to the Internet, but downloads are sent via 
     satellite at a speed near that of broadband Internet  
     access.
   ‣ Two‐way
satellite
access: allows upload and download 
     data communications. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship             HITBSecConf Dubai 2008




         Very
Small
Aperture
Terminal
   ‣ A one or two‐way terminal used in 
     a star, mesh or point to point network 
     with. Antenna size is restricted to 
     being less than or equal to 3.8 m at 
     Ku band and 7.8 m at C band.
   ‣ It consists of a large high performance 
     hub earth station (with an antenna of 
     up to 9 m in diameter) and a large 
     number of smaller, lower performance 
     terminals. These small terminals can 
     be receive only, transmit only or 
     transmit/receive.                                                    A 2.5m parabolic dish antenna for 
                                                                     bidirectional high‐speed satellite Internet.
                                                                     source: http://en.wikipedia.org/wiki/VSAT
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                          HITBSecConf Dubai 2008




        Frequency
Band
Designations
                                               300 MHz                                                          3 GHz

                              VHF                                             UHF
                                                                     1 GHz




                             VHF                                   UHF                            L            S



           3 GHz                                                                              30 GHz

                                                SHF                                                     EHF
                             8 GHz              12 GHz               18 GHz                        40 GHz       75 GHz




                      C                 X                  Ku                   K             Ka              V




                                        source: http://www.satcom‐services.com/sat_freq.htm
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                  HITBSecConf Dubai 2008




               Data communication service using satellite access media with Time Division Multiplex (TDM) / Time Division Multiple 
                                           Access (TDMA) technology based on Internet‐protocol.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatIP/tabid/85/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                HITBSecConf Dubai 2008




                        Data communication service using satellite access media with Single Channel per Carrier (SCPC) 
                                             connecting point‐to‐point and point‐to‐multipoint.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatLink/tabid/86/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship    HITBSecConf Dubai 2008




   Attacks
against
Satellite
Systems
   ‣ Hypothetical Attacks
        ‣      Denial of services (uplink/downlink jamming, overpower uplink), orbital 
               positioning attacks (raging transponder spoofing, direct commanding, 
               command replay, insertion after confirmation but prior to execution)

   ‣ Practical Attacks
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




               Abusing
Satellite
Systems


                         "Satellite Piggyjacking"
               (Exploiting Satellite Trust Relationship on VSAT Network)
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Satellite
Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find "free" frequency
   ‣ Transmit and receive
   ‣ Detection evasion
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                                   Demo
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                Detection
Issues
   ‣ Require at least another satellite and satellite 
      operator to detect rogue carrier (similar to GPS 
      mechanism).
     ‣ Satellite operator alliance co‐operation.
        ‣ Specialised company detecting rogue carrier.
   ‣ Hard to detect if rogue carrier has ability to 
     switch frequency automatically prior detection.
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               The
End
   ‣ Two years ago, we presented how to 
     compromise data link layer.
   ‣ Today, we present how to compromise network 
     layer.


                      Data
Link
+
Network
=
?

More Related Content

Similar to Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship

Bringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridBringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGrid
Larry Smarr
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
Larry Smarr
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
Larry Smarr
 
How Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific ResearchHow Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific Research
Larry Smarr
 
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
Larry Smarr
 
How Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific ResearchHow Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific Research
Larry Smarr
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
IRJET Journal
 
Blowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary ComputerBlowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary Computer
Larry Smarr
 
BSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listeningBSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listening
Pamela O'Shea
 
Is it Live or is it Telepresence?
Is it Live or is it Telepresence?Is it Live or is it Telepresence?
Is it Live or is it Telepresence?
Larry Smarr
 
How Fiber Optics are Transforming our World
How Fiber Optics are Transforming our WorldHow Fiber Optics are Transforming our World
How Fiber Optics are Transforming our World
Larry Smarr
 
Small Ku Band Phased Array Anteena System
Small  Ku Band Phased Array Anteena SystemSmall  Ku Band Phased Array Anteena System
Small Ku Band Phased Array Anteena System
Ritul Sonania
 
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsOptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
Larry Smarr
 
Experiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical WorldExperiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical World
Larry Smarr
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
Larry Smarr
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
2010
 2010 2010
2010
HaqueNawaz
 
Envisioning the Future
Envisioning the FutureEnvisioning the Future
Envisioning the Future
Larry Smarr
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
CODE BLUE
 
Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...
IJECEIAES
 

Similar to Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship (20)

Bringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridBringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGrid
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 
How Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific ResearchHow Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific Research
 
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
 
How Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific ResearchHow Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific Research
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
 
Blowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary ComputerBlowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary Computer
 
BSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listeningBSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listening
 
Is it Live or is it Telepresence?
Is it Live or is it Telepresence?Is it Live or is it Telepresence?
Is it Live or is it Telepresence?
 
How Fiber Optics are Transforming our World
How Fiber Optics are Transforming our WorldHow Fiber Optics are Transforming our World
How Fiber Optics are Transforming our World
 
Small Ku Band Phased Array Anteena System
Small  Ku Band Phased Array Anteena SystemSmall  Ku Band Phased Array Anteena System
Small Ku Band Phased Array Anteena System
 
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsOptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
 
Experiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical WorldExperiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical World
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
2010
 2010 2010
2010
 
Envisioning the Future
Envisioning the FutureEnvisioning the Future
Envisioning the Future
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
 
Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...
 

More from Jim Geovedi

Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
Jim Geovedi
 
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Jim Geovedi
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)
Jim Geovedi
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
Jim Geovedi
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
Jim Geovedi
 
Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour ruleJim Geovedi
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
Jim Geovedi
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
Jim Geovedi
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
Jim Geovedi
 
Satellite Telephony Security
Satellite Telephony SecuritySatellite Telephony Security
Satellite Telephony Security
Jim Geovedi
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsJim Geovedi
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingJim Geovedi
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Jim Geovedi
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
Jim Geovedi
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot SecurityJim Geovedi
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundJim Geovedi
 

More from Jim Geovedi (20)

Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
 
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour rule
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
 
Satellite Telephony Security
Satellite Telephony SecuritySatellite Telephony Security
Satellite Telephony Security
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry Birds
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite Hacking
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot Security
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship