Overview
This course aims to demonstrate how to remotely attack and take control of an aircraft, based on three years of research in aviation security. The course covers the classical methodology of discovery, information gathering, exploitation, and post-exploitation phases, all accomplished remotely without physical access to the target aircraft. The course utilizes ADS-B and ACARS protocols for discovery and information gathering, focusing on vulnerable on-board systems. The teaching method includes practical demonstrations, basic protocol information, and references for further reading. The course is intended for individuals interested in aviation security, vulnerability research, and exploitation techniques.
Syllabus
Introduction
Who am I
Agenda
Overview
DSP
DSP Security
Akers
FMS
Resources
Examples
Software
Flight Management System
Standard Information
Demo
Exploit
Ground Service Providers
Sita
Software Defined Radio
Post exploitation
Simon
New Platform
Android Device
Aviation Security
Questions
Ideal situation
Taught by
Hack In The Box Security Conference