Professional Documents
Culture Documents
6
DVB-S2 protocol for satellite
Digital Video Broadcasting - Satellite - Second Generation (DVB-S2) is a digital
television broadcast standard that has been designed as a successor for the popular DVB-
S system. It was developed in 2003 by the Digital Video Broadcasting Project, an international
industry consortium, and ratified by ETSI (EN 302307) in March 2005. The standard is based on,
and improves upon DVB-S and the electronic news-gathering (or Digital Satellite News
Gathering) system, used by mobile units for sending sounds and images from remote locations
worldwide back to their home television stations.
DVB-S2 is designed for broadcast services including standard and HDTV, interactive services
including Internet access, and (professional) data content distribution. The development of
DVB-S2 coincided with the introduction of HDTV and H.264 (MPEG-4 AVC) video codecs.
IP over DVB
DVB-S2 network system
Fibre-optical
By default, the data between BTS and BSC is carried out through fiber-optical, but when
special circumstances occur, such as earthquakes, floods, etc., when the fiber-optical
network between them is cut off, the “super station” will automatically switch to the
satellite network and use it The satellite network transmits the user's voice phone and SMS
message
Great system
𝐿𝑜 4120MHz
?
𝑓𝑎 𝑓𝑏
𝑓𝑏 = 𝑓𝑎 ± 𝐿𝑜
𝑓𝑎 , 𝑢𝑝𝑙𝑖𝑛𝑘 𝑓𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦; 𝑓𝑏 , 𝑑𝑜𝑤𝑛𝑙𝑖𝑛𝑘 𝑓𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦; 𝐿𝑜 , 𝑙𝑜𝑐𝑎𝑙 𝑓𝑟𝑞𝑢𝑒𝑛𝑐𝑦
𝑓𝑏 = 4120𝑀ℎ𝑧 => 𝐶 − 𝑏𝑎𝑛𝑑 𝑓𝑟𝑒𝑞𝑢𝑐𝑒𝑛𝑦 => 𝐿𝑜 = 2225𝑀𝐻𝑧 => 𝑓𝑎 = 4120 + 2225 = 6345𝑀ℎ𝑧
Stealing Communication Links
C-band frequency
Uplink: 5.85GHz -- 6.75GHz
Downlink: 3.4GHz – 4.2GHz
Local frequency: 2.225GHz
Satellite:ChinaSat 12
C-band: 6A Transponder
Ku-band: 11B Transponder
Ku-band:
IP:10.10.230.126
RX: 11300MHz + 1086.31MHz = 12386.31MHz(downlink)-10600(local)=1786.31MHz
TX: 13050MHz + 1000.00MHz = 14050.00MHz(uplink)
C-band:
IP:10.10.226.219
RX: 5150MHz - 1305.5MHz = 3844.5MHz
TX: 7300MHz - 1000.00MHz = 6300.00MHz
Option file from modem Lat:40.211N
Long: 116.238E
Receive signal from “Super Station”
Ku Band
C Band
Decode data from Super Station
Decod data from super station
In the data of
received ,we can
see VoIP
protocol and
BTS
communication
protocol
Social engineering
Me: “Yes”
Corporation”
Using OpenATS to receive signal
OpenATS
Eavesdropping on data
Searching satellite network
CrazyScan
Asia 9 Satellite
Downlink:
Rx Bitrate:25000000
Rx symrate:25 000 000
Modem rx freq:1247MHz
Downlink freq:1247+11300= 12547Mhz
Uplink:
Tx Bitrate :3000000
Tx symrate :1875000
Modem tx freq :1000000000
Uplink freq:13050+1000= 14050Mhz
China National Petroleum Corporation
X3 modem vulnerability scan
Why is iDirect network?
TRANSEC
sub_E7D94
>1cm
>1mm
Satellite network risk points
1. Spaceborne system backdoor,
vulnerability attack
2. Tracking in orbit, operation risk
Space 3. Supply chain intrusion attack
4. Spaceborne bus intrusion and
forgery attacks
5. Reconnaissance, capture attack
➢ 1997,Trespassers penetrated computers in the X-ray Astrophysics Section of a building on NASA’s Goddard Space Flight Center campus, where they
commandeered computers delivering data and instructions to satellites.
➢ 1998,A US-German ROSAT satellite, used for peering into deep space, was rendered useless after it turned suddenly toward the sun damaging the
High Resolution Imager by exposure, The attack allegedly originated from Russia.
➢ 1999,Hacker control one satellite of SkyNet
➢ 2002,An online intruder penetrated the computer network at the Marshall Space Flight Center
➢ 2002,Some hackers attack the XINNUO-1 satellite and change the TV content
➢ 2004,A cyber-trespasser who poked around NASA's Ames Research Center in Silicon Valley caused a panicked technician to pull the plug on the
facility's supercomputers to limit the loss of secure data (Epstein and Elgin 2008)
➢ 2005,A malignant software program gathered data from computers in the Kennedy Space Center’s Vehicle Assembly Building, where the Shuttle is
maintained.
➢ 2006,Due to concerns of computer network exploitation NASA facilities barred all incoming Word attachments from its computer systems (Epstein and
Elgin 2008)
➢ 2007,The Goddard Space Flight Center was again compromised
➢ 2007,Landsat-7, a US earth observation satellite jointly managed by NASA and the US Geological Survey, experienced 12 or more minutes of
interference
➢ 2008,hackers are thought to have loaded a Trojan horse in the computers at Johnson Space Center in Houston, Texas
➢ 2011,Romanian hacker TinKode allegedly obtained sensitive information from NASA’s Goddard Space Flight Center and the European Space Agency
which he then made publicly available online.
➢ 2011,NASA’s Jet Propulsion Laboratory (JPL) “reported suspicious network activity involving Chinese-based IP addresses... giving the intruders access to
most of JPL’s networks” (Martin 2012)
➢ 2015,On CCC Germany, Iridium system attack
➢ ...
Thanks