Главная
Study mode:
on
1
Starlink 101
2
Hardware revisions
3
UART - Login Prompt
4
PCB overview
5
RF Components
6
Identifying eMMC test points
7
Reading eMMC in-circuit
8
Extracting the eMMC dump
9
Unpacking the FIT
10
Temperature and RF channels
11
Webpages
12
Development geofences
13
Obtaining root
14
Fault injection
15
Crowbar VFI: Challenges
16
Example output
17
STM/SpaceX ARM TFA-A
18
Tricks of the trade
19
BL1 Glitch setup
20
ROM Bootloader (BL1)
21
BL1 glitch detection example
22
Enabling decoupling capacitors
23
Creating a mobile setup
24
PCB design
25
Installed modchip
26
SpaceX strikes back
27
Adapt
28
Network exploration
29
What's next?
30
Conclusion
Description:
Explore a comprehensive security evaluation of the SpaceX Starlink User Terminal in this BruCON conference talk. Delve into the black-box hardware analysis, uncovering vulnerabilities in the custom quad-core Cortex-A53 System-on-Chip. Learn about the successful bypass of firmware signature verification using voltage fault injection, leading to an unfixable compromise of the terminal. Discover the process of extracting the ROM bootloader and eFuse memory, and understand how the fault model used in countermeasure development falls short in practice. Follow the journey from laboratory experiments to the creation of a custom 'modchip' for executing arbitrary code. Gain insights into the initial exploration of the Starlink network and communication links. The presentation covers various aspects, including hardware revisions, PCB overview, RF components, eMMC extraction, fault injection techniques, and network exploration. Understand the implications of these findings for satellite communication security and the potential for further research in the Starlink ecosystem. Read more

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

BruCON Security Conference
Add to list
0:00 / 0:00