A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

BruCON Security Conference via YouTube Direct link

BL1 glitch detection example

21 of 30

21 of 30

BL1 glitch detection example

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Starlink 101
  2. 2 Hardware revisions
  3. 3 UART - Login Prompt
  4. 4 PCB overview
  5. 5 RF Components
  6. 6 Identifying eMMC test points
  7. 7 Reading eMMC in-circuit
  8. 8 Extracting the eMMC dump
  9. 9 Unpacking the FIT
  10. 10 Temperature and RF channels
  11. 11 Webpages
  12. 12 Development geofences
  13. 13 Obtaining root
  14. 14 Fault injection
  15. 15 Crowbar VFI: Challenges
  16. 16 Example output
  17. 17 STM/SpaceX ARM TFA-A
  18. 18 Tricks of the trade
  19. 19 BL1 Glitch setup
  20. 20 ROM Bootloader (BL1)
  21. 21 BL1 glitch detection example
  22. 22 Enabling decoupling capacitors
  23. 23 Creating a mobile setup
  24. 24 PCB design
  25. 25 Installed modchip
  26. 26 SpaceX strikes back
  27. 27 Adapt
  28. 28 Network exploration
  29. 29 What's next?
  30. 30 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.