DEF CON 31 War Stories - CON trolling the Weather - Paz Hameiri

preview_player
Показать описание
Nearly 1,800 weather balloons are launched across the world on any given day. As the balloon goes up it expands and pops at an altitude up to 33 Km (110K feet) above the earth.The flight payload is called a radiosonde. It measures pressure, temperature, relative humidity, position, and velocity during its flight, and transmits the data to a sounding receiver. One or two missing weather balloons won't impact the daily forecast. However, many missing balloons could lead to errors in weather models and forecasts. Weather balloons are also important for gathering weather data for satellite launches and human spaceflights, as launches are often delayed or scrubbed due to upper-level wind shear.

In this talk, I present a simulation framework for the most popular radiosonde model. It enables an attacker to generate radiosonde messages or alter logged messages for retransmission. I also present simulations of a jamming attack and a spoofing attack on a sounding receiver:

During a jamming attack, the receiver is unable to receive transmissions from active radiosondes.

During a spoofing attack, the transmitter sends fake radiosonde messages to a target receiver, identifying as an active radiosonde.

I'll talk about the shortcomings of the military variant of the radiosonde model and suggest a simple way to cope with spoofing attacks.
Рекомендации по теме
Комментарии
Автор

Interesting idea! Also worth noting that the sonde type data is now quite out of date, with Graw DFM17 radiosondes now occupying a big slot due to them being adopted by the US NWS.
I'd be interested to see how the spoofing works against a real Vaisala ground-station - our reverse engineered receivers are quite tolerant of oddities in the telemetry, I suspect the vaisala ground station might not be as tolerant!

markjessop