1. Start your projects with security concerns included in the project plan. This is called "security by design" 2. Include a security architect that can advise and analyze the security profile of projects. This goes beyond paper security and includes actual security reviews and security tests. 3. Pay for the cost of security by design. 4. Include penetration testing of all system components which include the people and processes operating a system.
At 4:04 the dude can be seen writing python in vim, I noticed that line 18 is going to throw an 'IndentationError' because he appears to be trying to set the variable name target to a URL but prepended the line with 'def' as if it were a function.
Getting into an open air satellites that have no security and been built in 90s and 80s and served 20+ years is indeed a good job but remember there isn't much they can do to an old satellite in space.
Point is: users should protect their traffic (themselves as providers don't do it for them). They don't realise that their data is publically visible over entire continents.
Agree, most of this old satellite are for TV and radio broadcast, not for spying...... New satellite that are being placed in the orbit are much mo secure than those 20 years ago but still serving tv broadcast..
Gamers have exploited every game ever released within hours of release. That's all you need to know to understand the scope of this problem, and how to address it. Once content (code) is released to the public, a diverse, creative, curious and intently driven community will pounce on it and quickly discover ways to exploit it.
The biggest issue with games now-a-days is people don't seem to care... Developers in particular because it is a business. They purposefully leave vulnerabilities ( example, allowing the client to dictate terms to the server when you should never trust client data... this is how people can be shot from across a solar system with a weapon which could never reach that far, instantly, and continuously because the server doesn't check the data and simply trusts. It is why speed hacks exist. It is why people can teleport, and more ). So here is how it is a business.... Game is released, charge is $15 to $120 for the game. Game is intentionally left vulnerable. Scripters use basic logic, packet spoofing, or whatever to replicate actions and if the server accepts it, cheaters have a tool. People in the community get annoyed that day 1 there are people cheating. Developers vow to ban cheaters. Cheaters are found, easily, and typically given a month to cheat before the account is banned. So the cheater gets to play the game on a subscription model while legitimate players who want to enjoy the game and not ruin it for others pay a one time fee for a license. Because the devs are being paid on 2 separate models based on cheater vs non-cheater, they do everything they can to keep that going. For instance, kicking cheaters for common cheats and telling the server about it ( Rust is an example where they kick people for 'fly hack' which can actually be triggered by standing on the very edge of a scrap helicopter as you can't board the helicopter even if you are on the same team, unless they allowed this, unless you are the owner. But you can stand on the very edge in the back and be airlifted out - this causes a false-positive ) making the community 'feel like' something is being done. The actual bans don't typically happen within days or weeks unless the cheater is blatantly doing it non-stop to the point where influential players are complaining. Then they get banned pretty quickly. Otherwise, infractions are added up and eventually the account is banned. But, these cheaters typically by 10s of accounts when the game is on sale, or get it for pennies on the dollar from hacked accounts, credit card fraud, and more. So they don't care - they just create a new free account on the service, then cheat and play to ruin other peoples fun on a subscription model. I am a developer myself, and I can't stand the state of the industry in this regard. I would never put this type of system into anything I work on. I would ban the cheater, log their hardware and every new account would be linked to it, along with other methods of tracking so they could create a thousand accounts and they wouldn't be able to be used and every account they try to login with ( with special conditions in place so they can't just hack someones account and get them banned permanently, etc... but they would then be temporarily blocked or some other mechanism to ensure innocent accounts can't be used in this regard ) would be blocked. Speedhacking is easily detectable. Aimbots are incredibly simple to detect, especially if they are blatant. Aim assists are also easy to detect, but more difficult that straight up snap-to'ing. Packet spoofing is stupid easy to detect too. If you design a game and the logic, then you know what to expect and if something falls outside the bounds of what can be done, for instance a player attempting to teleport or claim they are on something solid when they aren't ( ie fly hacking ), etc.. can easily be prevented... The goal is to have the server control and verify - but allow the client as much control as is reasonable. ie: Don't send the clients the full loot list, etc... when they are in range they can get data networked regarding things so they are far enough away it doesn't pop in ( ie just outside a door they are about to enter or could enter, etc.. ) but close enough that there is no major benefit... If the clients want to modify their money value - let them. It can act as a strike when the server sees the disconnect. All of that data can be tracked and used as evidence of cheating - obviously memory can fail so you wouldn't ban for something like that, when the client tries to use the money is when you can let them know about the money they have and fix the desync instead of 60 times per second for an unchanging value. Let them modify the memory data - although you could protect against that and if detected you could swap the data with a backup but that adds overheat... you could cause the game to crash - fun, then they'll just complain... so just let them, it won't matter especially if the server handles the data how it should. It just makes them see a big number and go - oh wow.... Let them edit their health and armor values too... it will only show the data on the hud and change the data they are seeing but it will not change when they perish, how much damage they take, etc.. because that's handled by the server when done properly... So many devs send so much data every frame when it isn't necessary. They don't track time properly, etc.. They trust client data... they don't know when to let a client modify something and when not to - or they just allow it and let the client tell the server that there was a valid change. I'm also not saying that Rust does this on purpose or to make money, but I'm stating it looks that way because of how long it takes to get people banned and it typically only happens within hours if an influencer reports the person non-stop or if the entire server is constantly reporting them, etc... most will gather info and do a bulk ban every month or so.... convenient...
That's different though. With basic public key cryptography you can make an unhackable satellite (assuming the private key isn't stolen from ground stations). With locally installed games, you can do whatever you want to decompile and mess with the game.
Very smart on the us Air Force to start this program. These “hackers” honestly are doing more to protect our country than most of our government officials ever could dream of doing . Thank you to everyone who is trying to improve our lives and make us more safe from the evil in this world.
YEh, the US military are wonderful. Nice how intelligence would not tell us who really took down 9-11 and we were in AFghanistan for twenty years and attacked iraq. But hey, gotta respect the military. you are damn stupid, bro. WE have not been in any danger since WW2, but have attacked about fifty nations since then.
To put it short, it's just turning radio wave into computer bytes. So learn about radio waves and eletricmegnatic field and how they work, then learn how to turn into computer bytes and read it
80s tv network satellites were wide open. I remember having a big dish in our back yard and equipment in the living room to tune the dish. my dad said he would watch football games from the raw feed with no commercials. Announcers would get into fights and threaten each other then a couple seconds later act like nothing happened “Aaand were back!” 😂
Did this 30+ years ago when we took over a TV sat and ran some video. Then a guy in a suit from Luxembourg came up on the second channel and asked us to stop. We did. Great evening it was. It was all analogue then and there was no security at all. All we did was build the transmitter for the upload freq. hooked it up to a dish and buy lots of beer.
5:47 *When he said , "some kid sitting in home" ; it felt good because it's like everyone knows these things can'tbe done by OLD Professionals but Curious Young ones*
This is nothing new. I’ve been intercepting weather data and imagery from us and Russian satellites for over a decade. Also doing this with consumer grade equipment is not as easy as the video makes it seem.
I'm really excited for knowing someone like Hitecyberspace On Telegram. I was surprised when my Commander Wilson Brown recommended you to us. From Usa Army says Thanks.
@@otfizy5774 yeah its been in open beta for a month (which is about when they commentated). i pre-ordered 2/11 and no dishy yet.. my internet is about as fast as a mail man traveling by horse, also the horse has a broken leg and the mail man is dead and being drug behind the horse. (hughes net keeping 10+ year old internet communication technology going and claiming its "high speed" when it has 1000+ ms ping at less than 2Mb/s)
I'm really excited for knowing someone like Hitecyberspace On Telegram. I was surprised when my Commander Wilson Brown recommended you to us. From Usa Army says Thanks
So this guy listened to signals from satellites with off the shelf gear - a very common/typical radio hobbist thing to do - where does the "hacking" part come in? Did he issue commands to alter the orbit or something? Did he compromise some security mechanism to gain uncommon access? I don't see the accomplishment here.
Listening to radio signals is one of the most basic forms of hacking but does take some skills and knowledge to do it right and the people with expert skills will blow your mind. This kind of video helps remove the taboo around this sort of thing by explaining it, knowledge is key
He is NOT hacking anything - he is merely listening in on bounced transmissions. Most are encrypted... apparently some are not. Satellite security is quite stable and secure, I don't see any command and control affected here. Comm companies such as television networks and internet companies lease comm channels and are responsible for securing their own data. It is NOT up to the satellite owner to secure the individual comm channels, they simply receive and re-transmit (bounce) channel data.
dang, I knew you can download images from weather? satellites using this process, but I guess you can also intercept unencrypted passwords if you pick the right satellite
I'm really excited for knowing someone like Hitecyberspace On Telegram. I was surprised when my Commander Wilson Brown recommended you to us. From Usa Army says Thanks.
Revenge of the Nerds cool movie... thanks for this and we need these type of individuals in the vid to make us more aware.. use your skills for good things guys.
The other day I was working at my brand spanking new space company. But I made a mistake, I asked how they protect against replaying messages, you know, idempotent message support. Suddenly a dude bursts through the door with a pair of pliers aiming them at my junk. These guys are something else.
Hacking satellite? Have you ever known or heard of a person whose name was Jim Geovedi? He's from Indonesia. Not only one person, but I forgot the name of the other, he hacked the satellite too. He presented it with the title "Hacking a bird in the sky".
Good flag! Here's the presentation if anyone is interested: conference.hitb.org/hitbsecconf2011ams/materials/D2T2%20-%20Jim%20Geovedi%20and%20Raoul%20Chiesa%20-%20Hacking%20a%20Bird%20in%20the%20Sky.pdf
I'm really excited for knowing someone like Hitecyberspace On Telegram. I was surprised when my Commander Wilson Brown recommended you to us. From Usa Army says Thanks.
You can literally purchase the gear required to hack satellites crazy easy.... they're insanely easy to torment from what I've researched. Also there are multiple open source resources that allow for satellite monitoring which is pretty neat because they tell you when and where certain satellites are if you're wanting to hack a sat. Love this video.
While it says to use a dish I have read the antenna is the only thing really necessary.... I'm most likely wrong i don't do this pro like J here does lol but yea hack-a-sat comp was selling the gear for it super cheap when defcon was cxld during covid if I recall 🤔
They just eavesdropped on a satellite signal and did not mention about encryption where most satellite broadcaster use. If they can control a satellite, that will be hacking but sad to say, an up and down transmission of those signals are just for broadcasters, signal that are use to control satellite in their stationary position in only in the uplink and it is secured.
NYC cSec prof here, I'm a resident at NYU Tandon, This video is full of withheld information. I will say this though, he's smart to be working in that field. But it's one of the LEAST competitive. Try working for Iron Mountain.
It started November 14 I know they were in my house no problem until then my phone locked wallet stolen my PO A not being honored in Abington when I was next on list of weird things that have happened my USA bank card my taxes 2 years of this did file a police report it was identify theft by a few people in my house when my mom passed away I hope when This all comes out it will help someone else going through this mental abuse using satellites for real 💯
He talked about eavesdropping a communication satellite signal and not hacking. Without enough data encryption protocols, signal transmitted in any wireless medium is vulnerable to eavesdropping. Sorry, but there is nothing new in this. I thought he would talk about taking control of a satellite and do some stuff with it like to shut it down etc.
I was thinking about that also, but it seems they are just thinking of decrypting those signals and not controlling the satellite, that is not hacking, its eavesdropping...
I was maybe expecting some hacking to take place in this video. Listening is not attacking. It’s passive. Exploiting is when you take control of the satellite.
Correct me if I'm wrong, but your talking about telecom satellites which essentially just bounce signals from and to Earth? These satellites use digital signalling, which can easily be encrypted -- not a simple solution? Seems too easy.
Exactly. Most comm satellites are simply repeaters. If the data isn't encrypted going up to the satellite then the data coming back won't be either. That's shear laziness on the organization leasing the comm channel.
The use of Jedi Hackers v.s. Pirate Hackers is the best way to keep alive satellites and network systems. Governments may install the Norton on Satellites :)
If You thought about something Uou can be almost completely assured that someone else had already thought about it before. Whatever They're trying to do here someone, somewhere has already done and is actively exploiting it right now, even as I'm typing it
...except for the fact that, in any realistic situation, it would be counter-intuitive to think about decoding satelite bitstreams into packets or bytes. The amount of time it could take is simply too large, no matter the reasons for executing such operations (some older sats are considered to be an exception because of non-existent encryption protocols). It could be done ofc, but should not be percieved as easily achieved as such....
We had a professor (was associated with US Govt)who told us one simple thing, security measure are not meant to stop attack but to prolong the attacking time ,more time will take ,more attackers will be discouraged and in meanwhile,another security measure can be implemented. TBH, this video was just exaggeration. Listening to satellites is just a hobby, i have been listening to many,specially NOAA related ones. The day, someone tries to get into more important SAT, you will find a black SUV outside your door.
This remembers me a Satellite that is been used for people audio rf comunications with no license to use it, and is been this way for about 10years ! The problem is the safety does not exist... and its not only on satellite´s, there is always a small "hole" to someone enter, just necessary to find it, where there is electronic and RF there is always to "enter the thing". Future is open doors to everything we use in life. Making all stuff "connectable".
You can't really protect analog radio transponders. There also wouldn't be a point, since unlicensed transmissions carry hefty fines and therefore have a very unfavorable risk/reward ratio for the offender. To really disturb anyone, you'd have to overpower the legitimate stations transmitting on the same frequency in the same region.
Old disused satellites are de-orbited. LEO's are sent back to Earth in a mini-fireworks show. GEO's are sent in the opposite direction - out into space.
How do you think we should improve cybersecurity?
screw too much security it's boring.
1. Start your projects with security concerns included in the project plan. This is called "security by design"
2. Include a security architect that can advise and analyze the security profile of projects. This goes beyond paper security and includes actual security reviews and security tests.
3. Pay for the cost of security by design.
4. Include penetration testing of all system components which include the people and processes operating a system.
No, stuff like this is fun
security through obscurity
more time DLP and encryption
I was hoping for the step-by-step process to hack a satellite.
Same...
You need to go watch his defcon talk for that
ua-cam.com/video/ku0Q_Wey4K0/v-deo.html
Yea I was just searching for something…..
was looking for the same...
You won't, because he hasn't. 2048 bit encryption is nearly impossible.
He looks like the most disciplined and down-to-earth hacker
Def the nerdiest though and it's a complement.
@Joe- Biden duh, that's a complement, coming from a fellow nerd. Be yourself pussy, nothing less in being a nerd.
Yeah, be afraid or he will let all hell break loose and won't even flinch
bhai ye ladka hai ldki?
@@PRASHANTKUMAR-sn2gs Ladka hi hoga na bhai
At 4:04 the dude can be seen writing python in vim, I noticed that line 18 is going to throw an 'IndentationError' because he appears to be trying to set the variable name target to a URL but prepended the line with 'def' as if it were a function.
We will relay this message, hopefully there's still time! 😉
Great eye!
haha so if a guy who cant code python can break a satellite we are screwed :D
Imagine using anything other than VS Code... Pitiful
Oh yeh I see that too ;)
Getting into an open air satellites that have no security and been built in 90s and 80s and served 20+ years is indeed a good job but remember there isn't much they can do to an old satellite in space.
Point is: users should protect their traffic (themselves as providers don't do it for them). They don't realise that their data is publically visible over entire continents.
what if they moved it to hit another satellite/object in orbit ?
Agree, most of this old satellite are for TV and radio broadcast, not for spying...... New satellite that are being placed in the orbit are much mo secure than those 20 years ago but still serving tv broadcast..
@@silverismoney they do not know words by means the satelites are controled from tower
"No system is safe" -MRX
aim for the impossible!!
whoami-You are a man of Culture i see
Wait, who am I wasn't german only :o
Because it's a German movie and I never thought about the fact that it got translated ^^
nevermind, it never got translated, the only available is the movie with english subtitle
Gamers have exploited every game ever released within hours of release. That's all you need to know to understand the scope of this problem, and how to address it. Once content (code) is released to the public, a diverse, creative, curious and intently driven community will pounce on it and quickly discover ways to exploit it.
The biggest issue with games now-a-days is people don't seem to care... Developers in particular because it is a business. They purposefully leave vulnerabilities ( example, allowing the client to dictate terms to the server when you should never trust client data... this is how people can be shot from across a solar system with a weapon which could never reach that far, instantly, and continuously because the server doesn't check the data and simply trusts. It is why speed hacks exist. It is why people can teleport, and more ).
So here is how it is a business....
Game is released, charge is $15 to $120 for the game. Game is intentionally left vulnerable. Scripters use basic logic, packet spoofing, or whatever to replicate actions and if the server accepts it, cheaters have a tool. People in the community get annoyed that day 1 there are people cheating. Developers vow to ban cheaters. Cheaters are found, easily, and typically given a month to cheat before the account is banned. So the cheater gets to play the game on a subscription model while legitimate players who want to enjoy the game and not ruin it for others pay a one time fee for a license.
Because the devs are being paid on 2 separate models based on cheater vs non-cheater, they do everything they can to keep that going. For instance, kicking cheaters for common cheats and telling the server about it ( Rust is an example where they kick people for 'fly hack' which can actually be triggered by standing on the very edge of a scrap helicopter as you can't board the helicopter even if you are on the same team, unless they allowed this, unless you are the owner. But you can stand on the very edge in the back and be airlifted out - this causes a false-positive ) making the community 'feel like' something is being done. The actual bans don't typically happen within days or weeks unless the cheater is blatantly doing it non-stop to the point where influential players are complaining. Then they get banned pretty quickly. Otherwise, infractions are added up and eventually the account is banned.
But, these cheaters typically by 10s of accounts when the game is on sale, or get it for pennies on the dollar from hacked accounts, credit card fraud, and more. So they don't care - they just create a new free account on the service, then cheat and play to ruin other peoples fun on a subscription model.
I am a developer myself, and I can't stand the state of the industry in this regard. I would never put this type of system into anything I work on. I would ban the cheater, log their hardware and every new account would be linked to it, along with other methods of tracking so they could create a thousand accounts and they wouldn't be able to be used and every account they try to login with ( with special conditions in place so they can't just hack someones account and get them banned permanently, etc... but they would then be temporarily blocked or some other mechanism to ensure innocent accounts can't be used in this regard ) would be blocked.
Speedhacking is easily detectable. Aimbots are incredibly simple to detect, especially if they are blatant. Aim assists are also easy to detect, but more difficult that straight up snap-to'ing. Packet spoofing is stupid easy to detect too. If you design a game and the logic, then you know what to expect and if something falls outside the bounds of what can be done, for instance a player attempting to teleport or claim they are on something solid when they aren't ( ie fly hacking ), etc.. can easily be prevented...
The goal is to have the server control and verify - but allow the client as much control as is reasonable. ie: Don't send the clients the full loot list, etc... when they are in range they can get data networked regarding things so they are far enough away it doesn't pop in ( ie just outside a door they are about to enter or could enter, etc.. ) but close enough that there is no major benefit... If the clients want to modify their money value - let them. It can act as a strike when the server sees the disconnect. All of that data can be tracked and used as evidence of cheating - obviously memory can fail so you wouldn't ban for something like that, when the client tries to use the money is when you can let them know about the money they have and fix the desync instead of 60 times per second for an unchanging value. Let them modify the memory data - although you could protect against that and if detected you could swap the data with a backup but that adds overheat... you could cause the game to crash - fun, then they'll just complain... so just let them, it won't matter especially if the server handles the data how it should. It just makes them see a big number and go - oh wow.... Let them edit their health and armor values too... it will only show the data on the hud and change the data they are seeing but it will not change when they perish, how much damage they take, etc.. because that's handled by the server when done properly...
So many devs send so much data every frame when it isn't necessary. They don't track time properly, etc.. They trust client data... they don't know when to let a client modify something and when not to - or they just allow it and let the client tell the server that there was a valid change.
I'm also not saying that Rust does this on purpose or to make money, but I'm stating it looks that way because of how long it takes to get people banned and it typically only happens within hours if an influencer reports the person non-stop or if the entire server is constantly reporting them, etc... most will gather info and do a bulk ban every month or so.... convenient...
!Save
That's different though. With basic public key cryptography you can make an unhackable satellite (assuming the private key isn't stolen from ground stations). With locally installed games, you can do whatever you want to decompile and mess with the game.
"diverse" lol
@@REALBanannaman Please explain your issue with "diverse."
Let me grab my satellite dish and laptop and hack into a satellite.
He left the part out when you get caught..which they can..you will go to prison
Very smart on the us Air Force to start this program. These “hackers” honestly are doing more to protect our country than most of our government officials ever could dream of doing . Thank you to everyone who is trying to improve our lives and make us more safe from the evil in this world.
YEh, the US military are wonderful. Nice how intelligence would not tell us who really took down 9-11 and we were in AFghanistan for twenty years and attacked iraq. But hey, gotta respect the military. you are damn stupid, bro. WE have not been in any danger since WW2, but have attacked about fifty nations since then.
Some dude in my country (Kenya) did this in 2015 but here in Africa, Almost no one cares
you guys still working on that spaceship?
when is it going to be finished 2079? im optimistic for 2090.
@@darkshadowsx5949 we're going to start prototype testing in 3090, so expect it to fly around 3150,and I'm being generous about this date .
This Coded series is great! I just wish they were several minutes longer and dug into the how!
So glad you like it! Thanks for the feedback, we are considering it going forward!
'How'🤣🤣
@@ram_bharosey what?
To put it short, it's just turning radio wave into computer bytes. So learn about radio waves and eletricmegnatic field and how they work, then learn how to turn into computer bytes and read it
80s tv network satellites were wide open. I remember having a big dish in our back yard and equipment in the living room to tune the dish. my dad said he would watch football games from the raw feed with no commercials. Announcers would get into fights and threaten each other then a couple seconds later act like nothing happened “Aaand were back!” 😂
Kids hacking space satellites sounds cool.. But they are not any ordinary kids... I can't even fix my broken speakers
Did this 30+ years ago when we took over a TV sat and ran some video. Then a guy in a suit from Luxembourg came up on the second channel and asked us to stop. We did. Great evening it was.
It was all analogue then and there was no security at all. All we did was build the transmitter for the upload freq. hooked it up to a dish and buy lots of beer.
true story
True and factual
Max headroom exposed
5:47
*When he said , "some kid sitting in home" ; it felt good because it's like everyone knows these things can'tbe done by OLD Professionals but Curious Young ones*
This is nothing new. I’ve been intercepting weather data and imagery from us and Russian satellites for over a decade. Also doing this with consumer grade equipment is not as easy as the video makes it seem.
NOAA 18,19,20 Weather satellites?
Okay hackerman
@@jeremiahblessing3891 yup. All their frequencies are publicly available as well as the meteor M2 rus satellite.
I'm really excited for knowing someone like Hitecyberspace On Telegram.
I was surprised when my Commander Wilson Brown recommended you to us.
From Usa Army says Thanks.
@@Jigamanx2 how did you learn
I can't wait for starlink 😁😁🙂.
Yh I just thought about that, wouldn't it be bad if they can easily be hacked
Looks like a new hackathon challenge for Elon
Starlink been out
to re-enter the atmosphere 18 months after launch due to its extremely low orbit.
@@otfizy5774 yeah its been in open beta for a month (which is about when they commentated). i pre-ordered 2/11 and no dishy yet..
my internet is about as fast as a mail man traveling by horse, also the horse has a broken leg and the mail man is dead and being drug behind the horse.
(hughes net keeping 10+ year old internet communication technology going and claiming its "high speed" when it has 1000+ ms ping at less than 2Mb/s)
Let's try not to have these come falling out of the sky.
🙏 🚫 ☄️ 🛰️
I'm really excited for knowing someone like Hitecyberspace On Telegram.
I was surprised when my Commander Wilson Brown recommended you to us.
From Usa Army says Thanks
They would burn up. No Biggie. They are only harmful to themselves. And trashing space.
@@janetjackson8117 The use of linguistic obfuscation in scientific review matches somewhat.
@Mist boohoo.
So this guy listened to signals from satellites with off the shelf gear - a very common/typical radio hobbist thing to do - where does the "hacking" part come in? Did he issue commands to alter the orbit or something? Did he compromise some security mechanism to gain uncommon access? I don't see the accomplishment here.
These real life hackers would make excellent side characters in sci-fi movies. They could at least improvise lines and make them more believable.
It's literally the watch dogs 2 scene
Listening to radio signals is one of the most basic forms of hacking but does take some skills and knowledge to do it right and the people with expert skills will blow your mind.
This kind of video helps remove the taboo around this sort of thing by explaining it, knowledge is key
He is NOT hacking anything - he is merely listening in on bounced transmissions. Most are encrypted... apparently some are not. Satellite security is quite stable and secure, I don't see any command and control affected here. Comm companies such as television networks and internet companies lease comm channels and are responsible for securing their own data. It is NOT up to the satellite owner to secure the individual comm channels, they simply receive and re-transmit (bounce) channel data.
My thought as well. He’s just receiving stuff. He probably need very different gear to uplink and control the satellite.
dang, I knew you can download images from weather? satellites using this process, but I guess you can also intercept unencrypted passwords if you pick the right satellite
So 35 dollars taxes, can there be enough write offs to take all income taxes away.
I'm really excited for knowing someone like Hitecyberspace On Telegram.
I was surprised when my Commander Wilson Brown recommended you to us.
From Usa Army says Thanks.
Sensationalism, hyper-drama, and much needless hype. You are trying to BS the viewer , not inform the viewer.
nope its all true. i took his course and now i have unlimited indonesian pornography.
i hate these normie oriented youtube channels
what's the antenna at 0:46 called? i've been buying up some cheap TV gear too, for the same purpose, but I haven't come across that yet.
So you're saying that if I ever wanted to talk to the FBI, all I'd need is a little determination and $300.
That is...exactly what we are saying. 😉
I mean, I’m sure you can find ways of doing it for free, but this is certainly one that’ll get you street nerd cred.
Why spent $300 ?
When u have a pc ?
Just say anything infront of ur camera
@FBI Federal Bureau of Investigation hey ! Just want to ask if facebook works for you
@FBI Federal Bureau of Investigationreally ?
How could be there a 3 year long delay for youtube's algorithm to recommend me this very video!
thank you guys 🙏🏻🙏🏻🙏🏻, awesome video
Our pleasure! Glad you enjoyed it!
Revenge of the Nerds cool movie... thanks for this and we need these type of individuals in the vid to make us more aware.. use your skills for good things guys.
I didn't know Harry Potter was also into hacking satellites.
Mechatronics Student here. Very inspiring stuff! Thx!
The other day I was working at my brand spanking new space company. But I made a mistake, I asked how they protect against replaying messages, you know, idempotent message support. Suddenly a dude bursts through the door with a pair of pliers aiming them at my junk. These guys are something else.
He doesn't have an Rgb keyboard. He's an imposter.
0:39 ask yourself who or what captured this video?
After watching this video.... Amature hackers will make a line outside the stores to purchase a dish antenna.. 😀😀😀
Why do they always try to find the most nerdiest looking hacker for shows 😂
Hacking satellite? Have you ever known or heard of a person whose name was Jim Geovedi? He's from Indonesia. Not only one person, but I forgot the name of the other, he hacked the satellite too.
He presented it with the title "Hacking a bird in the sky".
Good flag! Here's the presentation if anyone is interested: conference.hitb.org/hitbsecconf2011ams/materials/D2T2%20-%20Jim%20Geovedi%20and%20Raoul%20Chiesa%20-%20Hacking%20a%20Bird%20in%20the%20Sky.pdf
@@freethink Thx!
I'm really excited for knowing someone like Hitecyberspace On Telegram.
I was surprised when my Commander Wilson Brown recommended you to us.
From Usa Army says Thanks.
i'm going to shamelessly ask what every developer would ask - dude, please make a course on how to hack satellites lol
1:45 what my parents see when I reboot the rooter
He is not a hacker for sure. Where is the badass hoodie and glasses?
Seems like he is formal hacker chill bro
You can literally purchase the gear required to hack satellites crazy easy.... they're insanely easy to torment from what I've researched. Also there are multiple open source resources that allow for satellite monitoring which is pretty neat because they tell you when and where certain satellites are if you're wanting to hack a sat. Love this video.
While it says to use a dish I have read the antenna is the only thing really necessary.... I'm most likely wrong i don't do this pro like J here does lol but yea hack-a-sat comp was selling the gear for it super cheap when defcon was cxld during covid if I recall 🤔
They just eavesdropped on a satellite signal and did not mention about encryption where most satellite broadcaster use. If they can control a satellite, that will be hacking but sad to say, an up and down transmission of those signals are just for broadcasters, signal that are use to control satellite in their stationary position in only in the uplink and it is secured.
If Innocent hacker had a face
If Harry Potter hadn't a magic stick...
3:00: We know we're not the only people who can do this... we're not the only people who have done this.
China 🇨🇳: Don't I know it.
I didn’t know that eavesdropping to open or encrypted radio transmissions was considered “hacking”
NYC cSec prof here, I'm a resident at NYU Tandon, This video is full of withheld information. I will say this though, he's smart to be working in that field. But it's one of the LEAST competitive. Try working for Iron Mountain.
I need to find my old DVB-S PCI receiver again!
All I know is some cmd commands and some terminal commands
Thanks to this video. Many many many hackers started learning on how to hack Satellites
It started November 14 I know they were in my house no problem until then my phone locked wallet stolen my PO A not being honored in Abington when I was next on list of weird things that have happened my USA bank card my taxes 2 years of this did file a police report it was identify theft by a few people in my house when my mom passed away I hope when
This all comes out it will help someone else going through this mental abuse using satellites for real 💯
PHD student looks younger than 19years old wow
proving, yet again, that if I want to get in, I'm coming in whether you want me in or not..........
He talked about eavesdropping a communication satellite signal and not hacking. Without enough data encryption protocols, signal transmitted in any wireless medium is vulnerable to eavesdropping. Sorry, but there is nothing new in this. I thought he would talk about taking control of a satellite and do some stuff with it like to shut it down etc.
I was thinking about that also, but it seems they are just thinking of decrypting those signals and not controlling the satellite, that is not hacking, its eavesdropping...
the main advantage of a hacker being is he knows how to hack , and also to protect himself from that
NASA, 300 companies, European Space Agency, Harvard, SpaceX, Blue Horizon wants to know your location.
All this and not a single mention of the word ENCRYPTION. Amazing.
Those two guys staring up at the sky to get the corrds
I bet they were going to charge him, even though he was helping them
What is the dish he is using, it would be handy for ham radio use.
That’s one way to actually be able to see live unedited footage
What software was used in the clip of the satellite tracking segment?
This nerd walkin arround with dramatic music is the funniest thing ever bro made tea and the music is like he is defusing a bomb
Scary. Just knowing that it’s so wide open means just figuring out the steps & how each is executed.
We need more episodes 😢😢
Really surprising to see this. Aren't signals supposed to be encrypted? And if they are encrypted, did they find some way to break that?
all important signals are encrypted, they didn't
He has 2 monitors, He is a certified hacker man.
what would you do with two monitors that you can't with one?
@yuvrajsingh-gm6zk it's a joke dummy. The stereotype is hackers wear hoodie and has multiple monitor setup.
So it’s basically a home made echelon system 🤔😂
how is SDR Angel that has a lot of features that you can use different digital molds,
Everybody can do this, the most important is to help them to secure their systems and signal.
I like how the dude is literally named Savage.
I was maybe expecting some hacking to take place in this video. Listening is not attacking. It’s passive. Exploiting is when you take control of the satellite.
Correct me if I'm wrong, but your talking about telecom satellites which essentially just bounce signals from and to Earth? These satellites use digital signalling, which can easily be encrypted -- not a simple solution? Seems too easy.
Exactly. Most comm satellites are simply repeaters. If the data isn't encrypted going up to the satellite then the data coming back won't be either. That's shear laziness on the organization leasing the comm channel.
What programming languages he actually use for this
This video somehow reminded me of how I couldn't receive many TV stations in the current house I live in as the previous one.
The use of Jedi Hackers v.s. Pirate Hackers is the best way to keep alive satellites and network systems. Governments may install the Norton on Satellites :)
Various languages are available in the programming world, but if you don't know how to eat, you can't
If You thought about something Uou can be almost completely assured that someone else had already thought about it before.
Whatever They're trying to do here someone, somewhere has already done and is actively exploiting it right now, even as I'm typing it
I like how he's humble
A lot of trouble can arise from lax security...on earth and above
He should be banned from the lobby
These guys are going to send us to the stone age....
...except for the fact that, in any realistic situation, it would be counter-intuitive to think about decoding satelite bitstreams into packets or bytes. The amount of time it could take is simply too large, no matter the reasons for executing such operations (some older sats are considered to be an exception because of non-existent encryption protocols). It could be done ofc, but should not be percieved as easily achieved as such....
Listing to a satellite is one thing, but hacking it is a whole different world. Rx easy. Tx is very hard.
Next youtube search: _"Hack a satellite -step by step tutoriall"_
You know. You just risked everyone's privacy for telling us that we need to improve privacy
suprised this video wasnt taken down
Did anyone sit, watch a think.... Push your glasses up and for goodness sake get a new wardrobe 😅
ya like fortune 500 companies send “passwords” over satelite comminication… theres SHA for a reason
Anything…. don’t tell me these guys are able to decrypt private keys with 300$ tv equipment
No they can't, they just eavesdropping those signals...
So what they mean is to intercept the traffic. I think it is called "offline download" which is not possible anymore because of ssl. Am I right?
I was wondering if he would show free way to use sat internet from highly expensive musk charges
This is why the space force isn't a joke.
These guys are a joke, that's for sure.
We had a professor (was associated with US Govt)who told us one simple thing, security measure are not meant to stop attack but to prolong the attacking time ,more time will take ,more attackers will be discouraged and in meanwhile,another security measure can be implemented.
TBH, this video was just exaggeration. Listening to satellites is just a hobby, i have been listening to many,specially NOAA related ones.
The day, someone tries to get into more important SAT, you will find a black SUV outside your door.
Wow the intro was like watching a TV series
I payed more for my Icom IC-9700 and antenna Gear and I use Satellites Daily
The most surprising part about all this is that the hacker is using Windows.
This remembers me a Satellite that is been used for people audio rf comunications with no license to use it, and is been this way for about 10years ! The problem is the safety does not exist... and its not only on satellite´s, there is always a small "hole" to someone enter, just necessary to find it, where there is electronic and RF there is always to "enter the thing". Future is open doors to everything we use in life. Making all stuff "connectable".
You can't really protect analog radio transponders. There also wouldn't be a point, since unlicensed transmissions carry hefty fines and therefore have a very unfavorable risk/reward ratio for the offender. To really disturb anyone, you'd have to overpower the legitimate stations transmitting on the same frequency in the same region.
It would be fun to communicate with old disused satellites like a BBS
Old disused satellites are de-orbited. LEO's are sent back to Earth in a mini-fireworks show. GEO's are sent in the opposite direction - out into space.