jicent / dds-at-DEFCON

DDS workshops at DEFCON

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Aviation Hacking Banner

dds-at-DEFCON

For the second year, the Defense Digital Service is partnering with the United States Air Force to participate in Aerospace Village at DEF CON 28. This year we have expanded our scope beyond aviation to include space, specifically satellites! In addition to hosting the 2020 Space Security Challenge, the first-ever Hack-A-Satellite CTF at DEF CON, we are also bringing a series of interactive workshops to DEF CON in complete Safemode.

We have created a vibrant, web-based virtual reality environment for you to interact with each of our workshops. Access our virtual workshops at dds-virtual.com, otherwise, see below for the deets on game play for each of the work shops!

Documentation for Gameplay

Aviation Hacking Workshops: Bricks In The Air

In order to encourage more people to become interested in investigating aircraft vulnerabilities as well as understand the problems aircraft face, Bricks in the Air attempts to represent this problem in a simple and jargon free manner. By replacing the complex and unfamiliar 1553/429 buses with the more well known I2C data bus, we remove a lot of the jargon and confusion of the problem while allowing attendees to understand the core problem: Aircraft data buses are old and unsecure, and someone should fix that. Access the workshop files here: Bricks In The Air

Satellite Hacking Workshops: CPX Simple Sat, DDSAT-1, & NyanSat

  • CPX Simple Sat attempts to teach the basics of satellite exploitation with a ground station in an easily approachable and jargon free manor. Access the workshop files here: CPX Simple Sat
  • DDSat-1 focuses on showing the problems with how many of the control messages for satellites are either naturally unencrypted, or kick to an unencrypted mode should the satellite not be able to communicate with the ground station. Access workshop files here: DDSAT-1
  • The Nyansat workshop consists of three challenges:
    • DIY Tracking Antenna: Participants will build their own tracking antennas, which they can use to receive signals from satellites or terrestrial sources.
    • Hacking a Ground Station Modem: Red Balloon is making available a standard 56k modem used by satellite ground stations, so participants can learn about the state of ground station security and see how an attacker could exploit these devices..
    • Public, Live Streamed Ground Station: Red Balloon has constructed a working ground station that can receive data from thousands of satellites. They will be turning control of this station over to the DEFCON community, and livestreaming a Q&A, panel discussions, and of course, live data received by the antenna. Access workshop files here: NyanSat

DDS How to Libraries

A collection of learning resources for budding aviation security researchers (aka hackers). Learn so we can secure aviation from design to implementation! Note: This is an evolving resource, so please contribute with a pull request

A collection of Resources for budding SAT hackers (Satellites, not the test¯\(ツ)/¯). Note: This is an evolving resource, so please contribute with a pull request

Aviation Hacking Footer

About

DDS workshops at DEFCON

License:GNU General Public License v3.0


Languages

Language:Python 41.7%Language:HTML 41.1%Language:C++ 16.6%Language:Shell 0.6%