A Brief Overview on Satellite Hacking, By Anchises Moraes Guimarães de Paula, iDefense. Information Security, July 2010 I HItb MagazIne 17.
As a large portion of worldwide Internet users increasingly rely on satellite communication technologies to connect to the Web, a number of vulnerabilities within these connections actively expose satellites to potential attacks. The implications of such a successful attack are massive, as satellites are the only means of broadcasting communications in many regions around the globe and an attacker could act from everywhere.
Satellite Hacking.pdf,下载地址:http://115.com/file/e6etli97
以下为 PDF 直接转换为纯文本,缺少大量图片,并存在大量乱码,段落严重错位,仅做参考!
------------------------------------------ ↓ PDF To TXT ↓ ------------------------------------------
----------------------- Page 1-----------------------
information security
A Brief Overview on
satellite
hacking
By Anchises Moraes Guimaraes de Paula, iDefense
JULy 2010 I HItb MagazIne 17
----------------------- Page 2-----------------------
INFORMATION SECURITy INFORMATION SECURITy
As a large portion of worldwide Internet users increasingly and telephone transmissions by using Exhibit 1. Unidirectional Access with Terrestrial Return (also known as Satmodem)8
the transponder, a radio that receives
rely on satellite communication technologies to connect a conversation at one frequency and
then amplifies it and retransmits the
to the Web, a number of vulnerabilities within these signal back to Earth on another fre-
quency that a ground-based antenna
connections actively expose satellites to potential may receive. A satellite normally con-
tains 24 to 32 transponders, which are
attacks. The implications of such a successful attack are operating on different frequencies.4
massive, as satellites are the only means of broadcasting Modern communications satellites use
a variety of orbits including geosta-
communications in many regions around the globe and an tionary orbits,5 Molniya orbits,6 other
elliptical orbits and low Earth orbits
attacker could act from everywhere. (LEO).7 Communications satellites
are usually geosynchronous because
ground-based antennas, which op-
erators must direct toward a satellite,
can work effectively without the need
roadband Internet access via satel- services, such as Global Positioning Systems to track the satellite?ˉs motion. This al-
lite is available almost worldwide. (GPSs), weather forecasts, TV transmissions lows technicians to aim satellite antennas at Internet, with outbound data traveling through
Satellite Internet services are the and mapping service applications based on an orbiting satellite and leave them in a fixed a telephone modem or a DSL connection, but it
Bonly possible method of connect- real satellite images (such as Google Maps). position. Each satellite occupies a particular sends downloads via a satellite link at a speed
ing remote areas, the sea or countries where ?°Although anything that is in orbit around location in orbit and operates at a particular near that of broadband Internet access. Two-
traditional Internet cable connections are still Earth is technically a satellite, the term ?°satel- frequency assigned by the country?ˉs regula- way satellite Internet service, also known as
not accessible. Satellite communications are lite?± typically describes a useful object placed tor as the Federal Communications Commis- bidirectional access or ?°astro-modem,?± involves
also widely adopted as backup connection in orbit purposely to perform some specific sion (FCC) in the U.S. The electromagnetic both sending and receiving data via satellite to
providers by several organizations and coun- mission or task.?±2 There are several satellite spectrum usage is regulated in every coun- a hub facility, which has a direct connection to
tries for those times when the terrestrial com- types, defined by their orbits and functions: try, so that each government has its regula- the Internet (see Exhibit 2).
munications infrastructure is not available, scientific, Earth and space observation, re- tory agency which determines the purpose
damaged or overloaded. By the end of 2008, connaissance satellites (Earth observation or of each portion of radio frequency, according The required equipment to access satellite
an estimated 842,000 US consumers relied on communications satellites deployed for mili- to international agreements. communication includes a satellite dish, a
satellite broadband Internet access.1 tary or intelligence applications) and com- receiver for satellites signals, which is a low-
munications, which include TV, voice and The satellite provider supports Internet ac- noise block (LNB) converter, a decoder, a
Communications satellites routinely receive data connections. Most satellites are custom cess and Internet applications through the satellite modem and special personal-com-
and rebroadcast data, television, image and built to perform their intended functions. provider teleport location, which connects puter software. Usually, a single device or
some telephone transmissions without the to the public switched telephone network PCI card integrates the decoder and modem.
proper security measures, leading to frequent Organizations and consumers have used sat- (PSTN) and the Internet. There are three types Several software programs and online tools
fraud and attacks against satellite ser- ellite communication technology as a means of Internet via satellite access: one-way mul- are widely available.
vices. Traditional fraud techniques to connect to the Internet via broadband ticast, unidirectional with terrestrial return
and attack vectors include satel- data connections for a long time. Internet via and bidirectional access. One-way multicast Satellite Internet customers range from indi-
lite TV hacking and the use of satellite provides consumers with connec- transmits IP multicast-based data, both audio vidual home users to large business sites with
Satellites are an
illicit decoding technology tion speeds comparable or superior to digi- and video; however, most Internet protocols several hundred users. The advantages of
to hack into television sat- tal subscriber line (DSL) and cable modems. will not work correctly because they require this technology include a greater bandwidth essential part of
ellite signals. In addition, Data communication uses a similar design a return channel. A single channel for data than other broadband technologies, nearly our daily lives.
satellite communications and protocol to satellite television, known download via a satellite link characterizes worldwide coverage, and additional sup-
are easily susceptible as Digital Video Broadcasting (DVB), a suite unidirectional access with terrestrial return, port to television and radio services. Satellite Many global
to eavesdropping if not of open standards for digital television. DVB also known as ?°satmodem?± or a ?°one-way ter- broadband service is available in areas that interactions
properly encrypted. standards are maintained by the DVB Project, restrial return?± satellite Internet system, and terrestrially based wired technologies (e.g., rely on satellite
an international industry consortium. Ser- this type of satellite access uses a data uplink cable and DSL) or wireless technologies can-
SATELLITE BASICS vices using DVB standards are available on channel with slower speed connection tech- not operate. The disadvantages, however, are communications
Satellites are an essential part every continent with more than 500 million nologies (see Exhibit 1). numerous: weather conditions (rain, storms or satellite-
of our daily lives. Many global DVB receivers deployed, including at least or solar influences) might affect satellite com- powered
interactions rely on satellite com- 3 Communica-
100 million satellite receivers. Unidirectional access systems use traditional munications, satellites demand expensive
services.
munications or satellite-powered tions satellites relay data, television, images dial-up or broadband technology to access the hardware and have a complex setup (install-
18 HItb Magaz Ine I JULy 2010 JULy 2010 I HItb MagazIne 19
----------------------- Page 3-----------------------
INFORMATION SECURITy INFORMATION SECURITy
Exhibit 2. Bidirectional Satellite Communication9 sign and configuration flaws in public- radio programs based on a Linux operating To get an anonymous Internet connection
ly accessible satellite communication system, he was able to monitor Internet satel- via the satellite broadband network, Nve
networks and protocols, and they are lite transmission and to pipe its feed into his used this local Internet access connection
making impressive progress. laptop. From there, he could analyze packets as an uplink and the hacked satellite con-
using standard programs such as the popular nection as a downlink since he had the
In 2004, security researcher Warez- network protocol analyzer Wireshark. Accord- necessary means to capture all satellite
zman presented early studies on satel- ing to The Register, ?°Laurie has also developed traffic, including the IP response packets.
lite hacking at the Spanish conference software that analyzes hundreds of channels By figuring out the ISP satellite IP address
UNDERCON 0x08.15 In July 2006, Dan to pinpoint certain types of content, includ- range and using a satellite IP address not
Veeneman presented additional stud- ing traffic based on transmission control pro- in use, Nev established a TCP connection by
ies on satellite hacking at Defcon 04.16 tocol (TCP), user datagram protocol (UDP), sending packets with the spoofed satellite
Recently, various security researchers or simple mail transfer protocol (SMTP). The network?ˉs IP address via his local Internet
are leading the innovation in this area, program offers a 3D interface that allows the connection (a dial-up or regular broadband
notably, Jim Geovedi, Raditya Iryandi user to quickly isolate e-mail transmissions, connection) and he received the response
and Anthony Zboralski from the con- Web surfing sessions or television feeds that by sniffing the packets via the satellite in-
sulting company Bellua Asia Pacific; have recently been set up.?±20 terface (see Exhibit 3).
Leonardo Nve Egea from the Spanish
information security company S21SEC; In 2009, Leonardo Nve, a Spanish senior secu- Such attack is virtually untraceable, once the
and white-hat hacker Adam Laurie, di- rity researcher, presented his experiments on attacker can establish his or her connection
rector of security research and consul- satellite communications security at several from anywhere in the world, due to the fact
ing a satellite dish takes some knowledge to tancy at Aperture Labs Ltd. conferences around the world, including the that the satellite signal is the same for every-
configure the satellite?ˉs polarization and ori- Argentinean Ekoparty21 and the t2??09 Informa- one within the satellite coverage area. That
entation), and the satellite providers charge In September 2006, Geovedi and Iryandi pre- tion Security Conference in Finland,22 as well is, if a user based in Berlin uses a satellite
relatively high monthly fees. Moreover, many sented a ?°Hacking a Bird in the Sky?±17 talk as the 2010 edition of BlackHat DC, among company that provides coverage through-
types of applications, such as voice-over In- about hijacking very small aperture terminal others. His investigation is concentrated on out Europe, a malicious user could capture
ternet protocol (VoIP) and videoconferenc- (VSAT) connections at the 2006 Hack in the malicious attacks on satmodem communica- the downstream channel in Sicily or Paris.
ing, are not suitable for this type of connec- Box security conference (HITBSecConf2006) tions and how to get an anonymous connec- This technique leads to several new possible
tion due to the high latency. Typical satellite in Malaysia.18 They listed various hypotheti- tion via the satellite provider?ˉs broadband attacks, such as domain name system (DNS) ... data packets
telephone links have 550- 650 milliseconds of cal attacks against satellite communication network. Previously, satellite studies focused spoofing, TCP hijacking and attacking generic transmitted most
round-trip delay up to the satellite and back systems, such as denial of service (DoS) condi- only on feeds interception and data capture, routing encapsulation (GRE) protocol.
down to Earth.10 tions (uplink or downlink jamming, overpower since researchers were focusing on passive of the sensitive
uplink) and orbital positioning attacks (raging vulnerabilities. Nve was able to run active at- Proven insecure, satellite communications communication
RESEARCH ON HACKING SATELLITES transponder spoofing, direct commanding, tacks against the satellite clients and providers provide almost no protection against unau- in plain text with
Typical attacks against satellite networks in- command replay, insertion after confirmation using easy-to-find tools such as a satellite dish, thorized eavesdropping since they broadcast
clude satellite television hacking (the use but prior to execution), and gave a presenta- an LNB, cables, support, a digital video broad- all communications to a large area without no encryption.
of illegal reprogrammed descrambler cards tion about how to get access to the data link cast (DVB) system PCI card, a Satfinder
from legitimate satellite equipment to allow layer. Later, at the 2008 edition of the Hack In tool and a Linux box with the necessary Exhibit 3. Getting Anonymous Internet Access via Satellite Network
unlimited TV service without a subscription)11 The Box Security Conference, Geovedi, Iryandi free software, such as Linuxtv, kernel
and hacking into satellite networks to trans- and Zboralski gave a presentation about how drivers for DVB PCI cards, Linuxtv ap-
mit unauthorized material, such as political to compromise the satellite communication?ˉs plication tools and DVBsnoop (a DVB
propaganda.12 In March 2009, Brazilian Fed- network layer and how to run a practical ?°sat- protocol analyzer console available at
eral Police arrested a local group that was us- ellite piggyjacking?± attack, which exploits the http://dvbsnoop.sourceforge.net), and
ing U.S. Navy satellites for unauthorized com- satellite trust relationship on a VSAT network the Wireshark tool for data capture.23
munication.13 According to WIRED, ?°to use by finding a ?°free?± (unused) frequency range
the satellite, pirates typically take an ordinary inside a user-allocated frequency to transmit Nve based his attack research on find-
ham radio transmitter, which operates in the and receive data. ing open Internet satellite connec-
144- to 148-MHZ range, and add a frequency tions by running blind scans on avail-
radio enthusiasts doubler cobbled from coils and a varactor di- At the February 2009 Black Hat DC confer- able satellite channels and hacking
ode.?± Radio enthusiasts can buy all the hard- ence, Adam Laurie presented how to hack into DVB protocol. During his tests, he
can buy all the ware near any truck stop for less than USD into satellite transmissions using off-the-shelf was able to capture 7,967 data pack-
hardware near $500, while ads on specialized websites offer components that Laurie assembled himself by ets from typical Internet traffic in just
any truck stop to perform the conversion for less than USD spending just $785 US. Laurie claimed that he 10 seconds. According to his reports,
$100.14 To help the industry fight such inci- has been doing satellite feed hunting19 since data packets transmitted most of the
for less than
dents, information security researchers have the late 1990s. By using a modified Dream- sensitive communication in plain text
USd $500. been investigating the inherent security, de- box, a German receiver for digital TV and with no encryption.24
20 HItb Magaz Ine I JULy 2010 JULy 2010 I HItb MagazIne 21
----------------------- Page 4-----------------------
Advertisement
High Security Lab: http://lhs.loria.fr
INFORMATION SECURITy
proper confidentiality controls. Various pas- >>references Malware 2010
sive and active threats against insecure In-
ternet satellite communications include sniff- 1.?°State of the Satellite Industry Report.?± June 2009. Satellite Industry Association.
ing, DoS attacks and establishing anonymous http://www.sia.org/news_events/2009_State_of_Satellite_Industry_Report.pdf.
connections. Hacking into satellite receivers 2. Brown, Gary. ?°How Satellites Work.?± HowStuffWorks. http://science.howstuffworks.
com/satellite1.htm. Accessed on Nov. 5, 2009.
is much easier now than it was in the past, 3. ?°Introduction to the DVB Project.?± Mar. 23, 2010. DVB. http://www.dvb.org/
thanks to the widespread availability of Linux technology/fact_sheets/DVB-Project_Factsheet.pdf.
tools and several online tutorials. 4. ?°Satellite Technology.?± Nov. 5, 2009. Satellite Broadcasting & Communications
Association (SBCA). http://www.sbca.com/receiver-network/satellite-receiver.htm.
5. Geostationary orbits (also called geosynchronous or synchronous orbits) are
CONCLUSION
orbits in which a satellite always positions itself over the same spot on Earth.
Governmental, Military organizations and Many geostationary satellites (also known as Geostationary Earth Orbits, or GEOs)
most of the companies included within the orbit above a band along the equator, with an altitude of about 22,223 miles.
critical infrastructure sector such as transport, (Brown, Gary. ?°How Satellites Work.?± HowStuffWorks. http://science.howstuffworks.
com/satellite5.htm. Accessed on Nov. 5, 2009.)
oil and energy, are using satellite communi- 6.The Molniya orbit is highly eccentric ?a the satellite moves in an extreme ellipse with
cations for transmitting sensitive information the Earth close to one edge. Because the planet?ˉs gravity accelerates it, the satellite
across their widespread operations. This in- moves very quickly when it is close to the Earth. As it moves away, its speed slows,
cludes the use of satellite communication at so it spends more time at the top of its orbit farthest from the Earth. (Holli Riebeek.
?°Catalog of Earth Satellite Orbits / Three Classes of Orbit.?± Nov. 5, 2009. NASA Earth
industrial plants operating supervisory control Observatory. http://earthobservatory.nasa.gov/Features/OrbitsCatalog/page2.php.)
and data acquisition (SCADA) systems. The rel- 7. A satellite in low Earth orbit (LEO) circles the earth 100 to 300 miles above the
evance of satellite communication protection Earth?ˉs surface..(?°What Is a Satellite??± Satellite Industry Association. Nov. 5,
and the consequences of a security incident 2009. Boeing. http://www.sia.org/industry_
overview/sat101.pdf.)
should enforce these organizations to deploy 8. Warezzman. ?°DVB: Satellite Hacking For
additional security measures to their internal Dummies.?± 2004. Undercon. http://www.
communication technologies. Companies and undercon.org/archivo/0x08/UC0x08-DVB-
organizations that use or provide satellite data Satellite_Hacking.pdf.
9. Based on ?°DVB: Satellite Hacking for
connections must be aware of how insecure
Dummies?± by Warezzman source: http://
satellite connections are and aware of the pos- www.undercon.org/archivo/0x08/UC0x08-DVB-Satellite_
sible threats in this environment. Companies Hacking.pdf.
and users must implement secure protocols to 10. Brown, Gary. ?°How Satellites Work.?± HowStuffWorks.
http://science.howstuffworks.com/satellite7.htm. 5th IEEE International Conference
provide data protection, such as virtual private Nov. 5, 2009.
network (VPN) and secure sockets layer (SSL), 11. Berry, Walter. ?°Arrests Made in TV Satellite on Malicious and U wanted Software
since most traffic transmits unencrypted and Hacking.?± Jan. 25, 2009. abc News. http://abcnews.
is widely available in a large geographic area go.com/Technology/story?id=99047. Nancy, France, Oct. 20-21, 2010
12. Morrill, Dan. ?°Hack a Satellite while it is in orbit.?± April 13, 2007. Toolbox for IT. http://
under the satellite?ˉs coverage. it.toolbox.com/blogs/managing-infosec/hack-a-satellite-while-it-is-in-orbit-15690. http://malware10.loria.fr
13.?°PF descobre equipamento capaz de fazer ??gato?ˉ em sat¨|lite dos EUA?± (?°PF discovered
ABOUT THE AUTHOR equipment to hook into U.S. satellite?±). March 19, 2009. Jornal da Globo. (Global
Anchises M. G. de Paula, CISSP, is an Interna- Journal). http://g1.globo.com/Noticias/Tecnologia/0,,MUL1049142-6174,00-PF+DESCO Important dates Program Committee
BRE+EQUIPAMENTO+CAPAZ+DE+FAZER+GATO+EM+SATELITE+DOS+EUA.html.
tional Cyber Intelligence Analyst at iDefense, 14. Soares, Marcelo. ?°The Great Brazilian Sat-Hack Crackdown.?± Apr. 20, 2009. WIRED. Submission: June 30th, 2010 Anthony Arrott, Trend Micro
a VeriSign company. He has more than 15 http://www.wired.com/politics/security/news/2009/04/fleetcom. Notification: August 27th, 2010 Pierre-Marc Bureau, ESET
years of strong experience in Computer Secu- 15. Undercon home page. http://www.undercon.org/archivo.php?ucon=8. Accessed
on Nov. 5, 2009. Final version: September 10th, 2010 Mila Dalla Preda, Verona University
rity, and previously worked as Security Officer
in Brazilian telecom companies before be- 16. DEF CON IV home page. http://www.defcon.org/html/defcon-4/defcon-4.html. Saumya Debray, Arizona University
Accessed on Nov. 5, 2009.
coming Security Consultant for local infosec 17. Note: ?°Bird?± is a term for satellite. General Program Chair Thomas Engel, University of Luxembourg
resellers and consulting companies. Anchises 18. HITBSecConf2006 home page. http://conference.hitb.org/hitbsecconf2006kl. Jos¨| M. Fernandez, Ecole Polytechnique de
Accessed on Nov. 5, 2009. Fernando C. Colon Osorio, WSSRL and
holds a Computer Science Bachelor degree Montr¨|al
from Universidade de Sao Paulo (USP) and a 19. Note: ?°Feed Hunting?± means looking for satellite feeds that no one is supposed to find. Brandeis University
20. Goodin, Dan. ?°Satellite-hacking boffin sees the unseeable.?± Feb. 17, 2009. The Dr. Olivier Festor, INRIA
master degree in Marketing from ESPM. He Register. http://www.theregister.co.uk/2009/02/17/satellite_tv_hacking. Chairs of Malware 2010
has also obtained various professional cer- 21. Ekoparty Security Conference home page. http://www.ekoparty.com.ar. Jean-Yves Marion, Nancy University Prof. Brent Kang, North Carolina University
tificates including CISSP, GIAC (Cutting Edge Accessed on Nov. 5, 2009. Noam Rathaus, Beyond Security Prof. Felix Leder, Bonn University
Hacking Techniques) and ITIL Foundations. 22. t2??09 Information Security Conference home page. http://www.t2.fi/conference. Bo Olsen, Kaspersky
Accessed on Nov. 5, 2009. Cliff Zhou, University Central Florida
As an active member of Brazilian infosec com- 23. Nve, Leonardo. ?°Playing in a Satellite environment 1.2.?±). Black Hat. http:// Dr. Jose Nazario, Arbor networks
munity, he was the President of ISSA Chapter blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve- Publicity Co-Chairs Dr. Phil Porras, SRI International
Brazil in 2009 and one of the founding mem- Playing-with-SAT-1.2-wp.pdf. Accessed on May 28, 2010. Jose Morales, University of Texas Fred Raynal, Sogeti
bers of Brazilian Hackerspace and Brazilian 24. Nve, Leonardo. ?°Sat¨|lite: La senal del cielo que estabas esperando (II)?± (?°Satellite: Daniel Reynaud, Nancy-University
The sign from sky that you were waiting for (II)?±). Jan. 16, 2009. S21sec. http:// Andrew Walenstein, Lafayette University
Cloud Security Alliance chapter. * blog.s21sec.com/2009/01/satlite-la-seal-del-cielo-que-estabas_16.html. Local Chair
Jeff Williams, Microsoft
Matthieu Kaczmarek, INRIA
Yang Xiang, Deakin University
22 HItb MagazIne I JULy 2010