Главная
Study mode:
on
1
Intro
2
About me
3
About SPARTA
4
How SPARTA works
5
Why SPARTA doesnt work
6
ARP Spoof
7
Cyber Exploiter
8
Environment
9
Tps
10
Telemetry
11
Modifying the packets
12
jamming the packets
13
flooding attack
14
flight app
15
countermeasures
16
summary
17
reading material
Description:
Explore a DEF CON 32 conference talk that bridges the gap between theoretical space cyber attacks and real-world implementations through a practical demonstration of SPARTA techniques. Learn how man-in-the-middle attacks on ground infrastructure can compromise spacecraft systems, with detailed explanations of ARP spoofing, cyber exploitation, telemetry manipulation, packet modification, jamming, and flooding attacks targeting flight applications. Understand the critical vulnerabilities in space mission infrastructure, the breakdown of trust between ground systems and spacecraft, and discover essential countermeasures to protect space assets. Gain valuable insights into the urgent need for enhanced cybersecurity measures throughout space mission lifecycles, complete with recommended reading materials for further exploration.

From Theory to Reality: Demonstrating SPARTA Techniques Through Ground Infrastructure Attacks

DEFCONConference
Add to list
00:00
-00:15