Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

BruCON Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course covers a black-box security evaluation of the SpaceX Starlink User Terminal (UT), focusing on hardware vulnerabilities and security implications. The learning outcomes include understanding the architecture of the Starlink UT, performing fault injection attacks, extracting and analyzing firmware, obtaining root access, and exploring the Starlink network. The course teaches skills such as identifying hardware components, reading and extracting memory, conducting fault injection attacks, and analyzing firmware. The teaching method involves a presentation that includes real-world examples and demonstrations. The intended audience for this course includes hardware hackers, security researchers, and individuals interested in satellite communication security.

Syllabus

Starlink 101
Hardware revisions
UART - Login Prompt
PCB overview
RF Components
Identifying eMMC test points
Reading eMMC in-circuit
Extracting the eMMC dump
Unpacking the FIT
Temperature and RF channels
Webpages
Development geofences
Obtaining root
Fault injection
Crowbar VFI: Challenges
Example output
STM/SpaceX ARM TFA-A
Tricks of the trade
BL1 Glitch setup
ROM Bootloader (BL1)
BL1 glitch detection example
Enabling decoupling capacitors
Creating a mobile setup
PCB design
Installed modchip
SpaceX strikes back
Adapt
Network exploration
What's next?
Conclusion

Taught by

BruCON Security Conference

Reviews

Start your review of A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.