Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in VSAT (Very Small Aperture Terminal) systems used in maritime and remote communication environments through this 25-minute DEF CON 33 conference talk. Discover how these widely deployed systems have been overlooked in cybersecurity research despite their crucial role in maritime communications. Learn about real-world incidents including the Lab Dookhtegan hacker group's attacks on Iranian ship networks and previous DEFCON demonstrations of firmware reverse engineering and remote root exploitation targeting VSAT modems like the Newtec MDM2200. Examine ongoing research from 2023 that encompasses comprehensive VSAT firmware collection, re-hosting methodologies, and systematic vulnerability analysis through ACU (Antenna Control Unit) web interfaces. Gain detailed insights into recently discovered VSAT ACU web vulnerabilities, specifically CVE-2023-44852 through CVE-2023-44857, with in-depth analysis and live demonstrations. Understand the application of experimental testbed environments based on the "Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation" methodology. Analyze the security vulnerabilities and attack potentials inherent in VSAT systems while exploring the broader implications for maritime cybersecurity. Discover practical recommendations for policy enhancements, technological improvements, and the importance of international collaboration in strengthening maritime cyber defenses against evolving threats targeting critical communication infrastructure.
Syllabus
DEF CON 33 - Real Exploits, Testbed Validation, Policy Gaps in Maritime Connectivity - Juwon Cho
Taught by
DEFCONConference