- Prison Planet.com - http://www.prisonplanet.com -

Hacker uses an Android to remotely attack and hijack an airplane

Posted By admin On April 12, 2013 @ 4:56 am In Tile,U.S. News | Comments Disabled

Darlene Storm
Computer World [1]
April 12, 2013

The Hack in the Box [2] (#HITB2013AMS [3]) security conference in Amsterdam has a very interesting lineup of talks [pdf [4]]. One that jumped out was the Aircraft Hacking: Practical Aero Series [5] presented by Hugo Teso [6], a security consultant at n.runs in Germany. According to the abstract, “This presentation will be a practical demonstration on how to remotely attack and take full control of an aircraft, exposing some of the results of my three years research on the aviation security field. The attack performed will follow the classical methodology, divided in discovery, information gathering, exploitation and post-exploitation phases. The complete attack will be accomplished remotely, without needing physical access to the target aircraft at any time, and a testing laboratory will be used to attack virtual airplanes systems.

While keeping an eye on Twitter #HITB2013AMS [3], greatly interesting tweets started to appear as hackers who attended were excited. I will add some of those throughout this article.

Before his presentation, Teso recommended that people should have a littlebackground knowledge on aviation and aircraft systems [7]to better understand what he was going to explain. Here’s a few important facts: Automated Dependent Surveillance-Broadcast (ADS-B) has no security as was pointed out at Def Con 20 shortly before a hacker was able to inject ghost planes into radar [8]. It is unencrypted and unauthenticated. Teso said, “Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying, injection.” The Aircraft Communications Addressing and Reporting System (ACARS) also has no security; it “is used for exchanging text messages between aircraft and ground stations via radio (VHF) or satellite.” Although his talk did not focus on the vulnerabilities in those two protocols, he used them to find targets.

Full article here [1]

Article printed from Prison Planet.com: http://www.prisonplanet.com

URL to article: http://www.prisonplanet.com/hacker-uses-an-android-to-remotely-attack-and-hijack-an-airplane.html

URLs in this post:

[1] Computer World: http://blogs.computerworld.com/cybercrime-and-hacking/22036/hacker-uses-android-remotely-attack-and-hijack-airplane

[2] Hack in the Box: http://conference.hitb.org/hitbsecconf2013ams/

[3] #HITB2013AMS: https://twitter.com/search/realtime?q=%23HITB2013AMS&src=hash

[4] pdf: http://conference.hitb.org/hitbsecconf2013ams/agenda.pdf

[5] Aircraft Hacking: Practical Aero Series: http://conference.hitb.org/hitbsecconf2013ams/hugo-teso/

[6] Hugo Teso: https://twitter.com/hteso

[7] background knowledge on aviation and aircraft systems: http://commandercat.com/2013/04/hitb2013.html

[8] inject ghost planes into radar: http://blogs.computerworld.com/cybercrime-and-hacking/20775/curious-hackers-inject-ghost-airplanes-radar-track-celebrities-flights

Copyright © 2013 PrisonPlanet.com. All rights reserved.