← Back to Satellite Security

Satellite Penetration Testing

24 min read

Overview

Penetration testing satellite systems requires a fundamentally different approach from traditional network or application pentesting. The attack surface spans four distinct segments (space, ground, user, link), involves radio frequency (RF) communication subject to strict legal regulation, and encompasses hardware, firmware, software, and protocol-level vulnerabilities. The consequences of unauthorized testing can range from federal criminal charges (Computer Fraud and Abuse Act, FCC violations) to physical damage to multi-million-dollar space assets.

This page presents a structured methodology for satellite penetration testing, covering each phase from scoping and legal authorization through OSINT reconnaissance, passive and active RF analysis, ground segment testing, and reporting. All techniques described assume proper authorization and legal compliance — satellite pentesting without explicit written authorization is illegal in virtually every jurisdiction.

For the tools referenced throughout this page, see the Tools & Resources page. For the attack vectors and threat landscape that inform these tests, see the Attack Vectors page.


Methodology Overview

Satellite penetration testing follows a phased approach that progresses from entirely passive techniques (OSINT, passive RF monitoring) to increasingly active techniques (ground segment exploitation, RF injection) as authorization scope permits. This graduated approach manages legal risk and ensures that passive intelligence informs active testing.

flowchart TD
    A["Phase 1<br/>Scoping & Legal"] --> B["Phase 2<br/>OSINT & Recon"]
    B --> C["Phase 3<br/>Passive RF Analysis"]
    C --> D["Phase 4<br/>Ground Segment Testing"]
    D --> E["Phase 5<br/>Active RF Testing"]
    E --> F["Phase 6<br/>Reporting"]

    A1["Define scope across segments<br/>Obtain legal authorization<br/>Establish Rules of Engagement"] --> A
    B1["TLE data, Shodan/Censys<br/>Frequency databases<br/>OSINT on operators"] --> B
    C1["SDR monitoring<br/>Signal identification<br/>Protocol analysis"] --> C
    D1["VSAT terminal testing<br/>Ground station networks<br/>TT&C interface assessment"] --> D
    E1["GPS spoofing tests<br/>Uplink injection concepts<br/>Replay attacks"] --> E
    F1["Risk scoring<br/>Impact assessment<br/>Remediation priorities"] --> F

    style A fill:#e74c3c,color:#fff
    style B fill:#f39c12,color:#fff
    style C fill:#3498db,color:#fff
    style D fill:#2ecc71,color:#fff
    style E fill:#9b59b6,color:#fff
    style F fill:#1abc9c,color:#fff

Satellite penetration testing scoping is substantially more complex than traditional IT pentesting because the system spans multiple technical domains, multiple jurisdictions, and multiple regulatory regimes. Getting the scope and legal authorization wrong can result in federal criminal charges, FCC enforcement actions, and international treaty violations.

Defining Scope Across Segments

A satellite pentest scope must explicitly define which segments are in scope and what testing activities are authorized for each:

SegmentIn-Scope Activities (Typical)Usually ExcludedAuthorization Required From
Space SegmentFirmware analysis of identical ground units, protocol analysisDirect interaction with on-orbit spacecraftSpacecraft operator, program office
Ground SegmentNetwork pentesting, web app testing, VSAT terminal testingDisruption of operational TT&C systemsGround station operator, network owner
User SegmentTerminal hardware hacking, firmware extraction, app testingCustomer-owned terminals without consentTerminal manufacturer, service provider
Link SegmentPassive RF monitoring, authorized active RF testingUnauthorized transmission on licensed frequenciesFCC (or national regulator), satellite operator

Regulatory Requirements

Satellite pentesting involves regulatory requirements that traditional IT pentesters rarely encounter:

FCC Regulations (United States):

  • FCC Part 25: Governs satellite communications. Any transmission on licensed satellite frequencies requires FCC authorization. Even “testing” transmissions without authorization violate federal law.
  • FCC Part 97: Amateur radio regulations. Some satellite security researchers use amateur radio satellites for authorized experimentation, but Part 97 prohibits encryption and commercial use.
  • FCC Part 15: Unlicensed devices. SDR receivers operate under Part 15 (receive-only is generally unrestricted), but any intentional transmission must comply with applicable rules.
  • Communications Act Section 705: Prohibits unauthorized interception and divulgation of satellite communications content. Passive monitoring of unencrypted signals for security research occupies a legal gray area — consult legal counsel.

ITU Regulations:

  • ITU Radio Regulations Article 15 prohibits harmful interference to any radio service. Active RF testing that interferes with satellite communications violates international treaty obligations.
  • National administrations enforce ITU regulations domestically. In the U.S., the FCC enforces spectrum regulations; in the UK, Ofcom; in the EU, national regulatory authorities under the EECC framework.

Additional Legal Frameworks:

  • Computer Fraud and Abuse Act (CFAA): Applies to unauthorized access to satellite ground systems and management platforms. Written authorization from the system owner is essential.
  • Wiretap Act / ECPA: May apply to interception of satellite communications, even for security testing purposes.
  • ITAR: If the satellite system involves ITAR-controlled technology, the pentest team and reports may be subject to export control restrictions.

Rules of Engagement

Satellite pentest Rules of Engagement (RoE) should address scenarios unique to space operations:

  • Spacecraft safe mode triggers: Define emergency contact procedures if testing causes a spacecraft anomaly.
  • RF transmission boundaries: Specify exact frequencies, power levels, bandwidths, durations, and geographic boundaries for active RF testing.
  • Operational windows: Schedule active testing to avoid conflicts with critical satellite operations (station-keeping maneuvers, payload reconfigurations, eclipse periods).
  • Data handling: Specify handling, storage, and destruction of intercepted satellite communications, particularly for third-party traffic.
  • Escalation procedures: Define escalation paths for critical vulnerabilities discovered during testing.

Phase 2 — OSINT and Reconnaissance

Satellite OSINT is exceptionally productive because the space industry, by necessity and regulation, publishes substantial technical information about satellite systems. Orbital parameters are publicly tracked, frequency allocations are filed with the ITU, and ground station infrastructure is often discoverable through internet scanning.

Orbital Data and Satellite Tracking

space-track.org:

The U.S. Space Surveillance Network publishes Two-Line Element sets (TLEs) for tracked space objects through space-track.org (requires free registration). TLEs provide orbital parameters that enable prediction of a satellite’s position at any given time.

ISS (ZARYA)
1 25544U 98067A   24045.51458333  .00016717  00000-0  10270-3 0  9002
2 25544  51.6416 247.4627 0006703 130.5360 229.6360 15.49438000 12345

Key intelligence from TLEs:

  • Orbital inclination and period: Determines ground coverage and revisit times.
  • NORAD catalog number: Unique identifier for cross-referencing in other databases.
  • Epoch and decay rate: Indicates whether the satellite is actively maintained (station-keeping).

Tracking tools:

# Install and configure gpredict for satellite tracking
sudo apt install gpredict

# N2YO API for programmatic tracking
curl "https://api.n2yo.com/rest/v1/satellite/positions/25544/41.702/-76.014/0/2/&apiKey=YOUR_KEY"

# celestrak.org for supplementary TLE data
wget "https://celestrak.org/NORAD/elements/gp.php?GROUP=starlink&FORMAT=tle" -O starlink_tles.txt

gpredict provides real-time satellite tracking with pass prediction — essential for timing passive RF monitoring sessions to coincide with satellite passes over your receive location.

Internet-Connected Ground Infrastructure

Shodan and Censys queries for satellite infrastructure:

# Shodan queries
"iDirect" port:443                       # iDirect VSAT terminals
"Hughes" "HT2000" port:80               # Hughes modems
http.title:"Antenna Control" port:80     # Antenna control interfaces
"Satellite" "Ground Station" port:161    # SNMP on ground stations
"ACU" "Antenna" port:502                 # Modbus antenna controllers

# Censys queries
services.http.response.body:"ground station" AND services.port:443
services.banner:"iDirect"

Look for management interfaces exposed to the internet, default/self-signed TLS certificates revealing organizational details, banner information disclosing software versions, and open SNMP communities.

Frequency and Spectrum Databases

ITU BR IFIC (International Frequency Information Circular):

The ITU Radiocommunication Bureau publishes frequency filings for all satellite networks through the BR IFIC database. This includes:

  • Filed frequency bands for uplink and downlink
  • Orbital position (for GEO satellites)
  • Polarization (linear or circular, RHCP/LHCP)
  • Emission designator (reveals modulation type and bandwidth)
  • Filing administration (country of registry)

Additional frequency resources:

ResourceInformation AvailableAccess
ITU BR IFIC / SNS OnlineOfficial frequency filings, technical characteristicsSubscription (national administrations)
SatBeams (satbeams.com)Beam coverage maps, frequency plans, transponder layoutsFree
LyngSat (lyngsat.com)TV/radio satellite channel frequencies, symbol ratesFree
Gunter’s Space PageSatellite technical specifications, launch detailsFree
FCC IBFSU.S. satellite license applications with technical exhibitsFree (fcc.gov)
UCS Satellite DatabaseOpen-source database of operational satellitesFree (ucsusa.org)

FCC International Bureau Filing System (IBFS): For FCC-licensed satellites, IBFS contains detailed technical exhibits including exact uplink/downlink frequency ranges, EIRP levels, modulation/coding schemes, ground station coordinates, and beam coverage areas.

Social Engineering and Human Intelligence

Satellite operators are vulnerable to social engineering like any organization. Key OSINT sources include LinkedIn (identify operators and engineers; job postings reveal technology stacks), satellite industry conference presentations (SATELLITE, SpaceCom, MILCOM, SmallSat), academic publications by affiliated researchers, and government procurement records (SAM.gov, FPDS) revealing contractors and technology specifications.


Phase 3 — Passive RF Analysis

Passive RF analysis involves receiving and analyzing satellite signals without transmitting. In most jurisdictions, receiving satellite signals is legal (with exceptions for intentional interception of private communications). Passive analysis provides intelligence about the target satellite’s communication protocols, modulation schemes, and potential vulnerabilities — all without any risk of interference.

SDR Setup for Satellite Monitoring

Recommended hardware for satellite signal reception:

SDR DeviceFrequency RangeBandwidthUse CaseApproximate Cost
RTL-SDR V424 MHz - 1.766 GHz2.4 MHzL-band (Iridium, Inmarsat, GPS)$30
Airspy Mini24 MHz - 1.8 GHz6 MHzL-band with better dynamic range$100
HackRF One1 MHz - 6 GHz20 MHzWide frequency coverage, TX capable$350
LimeSDR Mini 2.010 MHz - 3.5 GHz30.72 MHzFull-duplex, MIMO capable$250
Ettus USRP B21070 MHz - 6 GHz56 MHzProfessional-grade, MIMO$2,500
Nooelec SAWbird+Filtered LNAN/ALow-noise amplifier for specific bands$30

Antenna considerations:

  • L-band (1-2 GHz): Patch antenna, quadrifilar helix antenna (QFH), or Yagi for Iridium/Inmarsat/GPS
  • S-band (2-4 GHz): Helical antenna or small dish (60+ cm)
  • C-band (4-8 GHz): 1.2m+ parabolic dish with C-band LNB
  • Ku-band (12-18 GHz): 60cm+ offset dish with Ku-band LNB
  • Ka-band (26-40 GHz): 45cm+ dish with Ka-band LNB (higher precision required)

Signal Identification and Analysis

DVB-S2 signal identification:

DVB-S2 (Digital Video Broadcasting - Satellite, 2nd Generation) is the dominant protocol for satellite TV distribution and increasingly for broadband. Identifying DVB-S2 signals:

# Using SatDump for DVB-S2 signal processing
# Install SatDump
git clone https://github.com/SatDump/SatDump.git
cd SatDump && mkdir build && cd build
cmake -DCMAKE_BUILD_TYPE=Release ..
make -j$(nproc) && sudo make install

# Record baseband from RTL-SDR for analysis
rtl_sdr -f 1545000000 -s 2400000 -g 40 capture.bin

# Analyze with inspectrum for visual signal analysis
inspectrum capture.bin

Signal parameter identification:

When you observe a satellite signal, determine the following parameters:

ParameterHow to DetermineTools
Center frequencySDR waterfall display, compare to filed frequenciesGQRX, SDR#, SDR++
BandwidthMeasure -3dB points on spectrum displayGQRX, inspectrum
ModulationVisual pattern on constellation diagramGNU Radio, SatDump
Symbol rateMeasure symbol width in time domainGNU Radio, baudline
PolarizationRotate antenna feed, measure signal strengthPhysical observation
FEC codingAttempt decode with different coding parametersSatDump, GNU Radio
ProtocolMatch parameters to known standardsCross-reference databases

VSAT Carrier Identification

VSAT (Very Small Aperture Terminal) networks operate in C-band, Ku-band, or Ka-band. During passive monitoring, look for:

  • Outbound carriers (hub-to-remote): High-bandwidth, continuous TDM carriers. Often DVB-S2 modulation. These carry data from the hub to remote terminals.
  • Inbound carriers (remote-to-hub): Lower-bandwidth, bursty TDMA or SCPC carriers. These reveal remote terminal locations and traffic patterns.
  • ACM (Adaptive Coding and Modulation): DVB-S2X carriers that change modulation and coding based on link conditions. The MODCOD field in the physical layer header is unencrypted and reveals link quality information.

Security-relevant observations from passive VSAT monitoring: Unencrypted management traffic (terminal provisioning, firmware updates), unencrypted user traffic, terminal identification in protocol headers, and network topology information from routing protocols carried over the satellite link.


Phase 4 — Ground Segment Testing

The ground segment is the most accessible attack surface in satellite systems and the most amenable to traditional penetration testing techniques. Ground segment testing can often be conducted without any RF-specific equipment or regulatory concerns.

VSAT Terminal Testing

VSAT terminals are among the most common satellite equipment encountered in penetration testing. They are deployed in large numbers, often in physically accessible locations, and frequently suffer from poor security hygiene.

Default credential testing:

VendorProductCommon Default CredentialsInterface
HughesHT2000W / HT2500admin:admin, admin:passwordHTTPS (:443)
iDirectiQ Desktop / Evolutionadmin:P@55w0rd!, admin:iDirectHTTPS (:443)
NewtecMDM Seriesadmin:newtec, admin:adminHTTPS (:443), SSH (:22)
GilatSkyEdge II-cadmin:adminHTTP (:80)
ComtechCDM-760admin:password, comtech:comtechHTTPS (:443), Serial
ViaSatSurfBeam 2admin:adminHTTP (:80)
Kymetau8admin:adminHTTPS (:443)

Important: These are commonly reported default credentials found in public documentation, security advisories, and vendor manuals. Always verify against current vendor documentation, as defaults change between firmware versions.

Firmware extraction and analysis:

# UART access - identify UART pins on terminal PCB
# Common baud rates for satellite terminals: 9600, 38400, 115200
screen /dev/ttyUSB0 115200

# Once connected, check for shell access
# Many terminals drop to BusyBox or custom Linux shell

# JTAG access for deeper analysis
# Use OpenOCD with appropriate JTAG adapter
openocd -f interface/ftdi/um232h.cfg -f target/arm926ejs.cfg

# Firmware extraction via SPI flash
# Identify flash chip, connect with SPI programmer
flashrom -p ch341a_spi -r firmware_dump.bin

# Firmware analysis with binwalk
binwalk -e firmware_dump.bin
# Look for:
# - Hardcoded credentials in extracted filesystem
# - Private keys / certificates
# - Configuration files with network topology
# - Debug interfaces left enabled

# String analysis for credentials
strings firmware_dump.bin | grep -i -E "password|passwd|secret|key|token"

# Entropy analysis to identify encrypted/compressed sections
binwalk -E firmware_dump.bin

Web interface vulnerabilities:

VSAT terminal web management interfaces commonly suffer from:

  • Command injection: Many terminals pass user input directly to shell commands for network configuration, ping tests, or diagnostic functions. Test all input fields with standard OS command injection payloads.
  • Improper authentication: Session tokens that are predictable or do not expire, missing CSRF protection, authentication bypass through direct URL access.
  • Information disclosure: Debug pages, status pages, or API endpoints that reveal network configuration, neighboring terminal information, or satellite link parameters without authentication.
  • Insecure firmware updates: Firmware update mechanisms that do not verify digital signatures, allowing an attacker to flash modified firmware.
# Example: Testing VSAT terminal web interface
# Enumerate web interface endpoints
gobuster dir -u https://192.168.1.1 -w /usr/share/wordlists/dirb/common.txt -k

# Test for command injection in diagnostic functions
# Common injection points: ping test, traceroute, DNS lookup
curl -k "https://192.168.1.1/cgi-bin/ping.cgi" \
  -d "target=8.8.8.8;id"

# Check for unauthenticated API endpoints
curl -k "https://192.168.1.1/api/v1/status"
curl -k "https://192.168.1.1/api/v1/config"
curl -k "https://192.168.1.1/cgi-bin/sysinfo"

# Test for directory traversal
curl -k "https://192.168.1.1/cgi-bin/download.cgi?file=../../../etc/passwd"

Ground Station Network Penetration Testing

Ground station networks combine IT and OT components, requiring a hybrid testing approach:

Network architecture reconnaissance:

# Network discovery on ground station network
nmap -sn 10.0.0.0/24                    # Host discovery
nmap -sV -sC -p- 10.0.0.0/24 -oA scan  # Full port/service scan

# Common services found in ground station networks:
# - SNMP (UDP 161) - Antenna controllers, RF equipment
# - Modbus (TCP 502) - SCADA/ICS components
# - HTTP/HTTPS (80/443) - Equipment management interfaces
# - SSH (22) - Linux-based ground station controllers
# - VNC (5900) - Remote access to operator consoles
# - Custom ports - Proprietary TT&C and M&C protocols

# SNMP enumeration of antenna control equipment
snmpwalk -v2c -c public 10.0.0.50 1.3.6.1
# Look for: antenna position, frequency settings, power levels

# Test for default Modbus access to antenna controllers
python3 -c "
from pymodbus.client import ModbusTcpClient
client = ModbusTcpClient('10.0.0.100')
client.connect()
# Read holding registers (antenna position, status)
result = client.read_holding_registers(0, 10, unit=1)
print(result.registers)
"

TT&C interface security assessment:

Telemetry, Tracking, and Command (TT&C) interfaces are the most critical components in the ground segment. Testing should assess:

  • Command authentication: Are commands to the spacecraft authenticated? Can an attacker on the ground network inject unauthorized commands?
  • Telemetry integrity: Is telemetry data integrity-protected from the ground station to the mission control center? Can an attacker modify telemetry in transit to mask anomalies?
  • Key management: How are cryptographic keys for command authentication stored and managed? Are they in HSMs or in software?
  • Network segmentation: Is the TT&C network properly segmented from the enterprise IT network? Can an attacker who compromises an enterprise workstation reach TT&C systems?
  • Remote access: How do operators access TT&C systems remotely? Are VPN connections properly secured? Is multi-factor authentication enforced?

API Testing for Satellite Management Platforms

Modern satellite operators increasingly use cloud-based platforms and APIs for fleet management, capacity allocation, and service provisioning. Key API endpoints to test include satellite telemetry retrieval, command submission, ground station scheduling, antenna control, and capacity allocation. Apply standard OWASP API Top 10 methodology with particular attention to:

  • BOLA/IDOR: Change satellite/ground station IDs to access other operators’ resources
  • Command injection: Command submission endpoints that may pass input to spacecraft command processors
  • Mass assignment: Adding privileged fields (admin roles, spacecraft access levels) to user update requests
  • Rate limiting: Absence enables brute force against authentication and resource exhaustion on capacity APIs

Phase 5 — Active RF Testing

Active RF testing involves transmitting radio signals to test satellite system resilience. This phase requires the highest level of authorization and carries the greatest legal risk. Active RF testing must only be performed with explicit written authorization from the satellite operator and any relevant regulatory authority (e.g., FCC experimental license).

GPS Spoofing Test Methodology

GPS spoofing is one of the most impactful and well-documented active RF attacks against satellite-dependent systems. Testing GPS spoofing resilience is increasingly requested by organizations that depend on GPS for timing (financial systems, power grids) or navigation (maritime, aviation, autonomous vehicles).

Test setup (RF-shielded environment or direct cable connection only):

# Hardware: HackRF One + GPS antenna (or direct cable with 60+ dB attenuator)
# Software: GPS-SDR-SIM (https://github.com/osqzss/gps-sdr-sim)

# Download current GPS ephemeris
wget "https://cddis.nasa.gov/archive/gnss/data/daily/2024/brdc/brdc0450.24n.gz"
gunzip brdc0450.24n.gz

# Generate spoofed GPS baseband signal for target location
./gps-sdr-sim -e brdc0450.24n -l 38.8977,-77.0365,100 -b 8 -d 300 -o spoofed_gps.bin

# Transmit via HackRF (IN SHIELDED ENVIRONMENT ONLY)
hackrf_transfer -t spoofed_gps.bin -f 1575420000 -s 2600000 -a 1 -x 20

GPS spoofing test cases:

Test CaseDescriptionExpected Resilient Behavior
Static position spoofSpoof GPS to report a different fixed locationReceiver detects jump discontinuity, alerts
Gradual driftSlowly shift reported position over timeReceiver detects deviation from IMU/other sensors
Time manipulationSpoof GPS time to a different epochTiming system detects discontinuity, falls back to holdover
Selective denialSpoof specific satellites while leaving othersReceiver detects inconsistent pseudoranges
Meaconing (replay)Record and replay real GPS signals with delayReceiver detects timing inconsistency
Power advantageTransmit spoofed signal at higher power than real GPSTests receiver’s ability to detect abnormal signal strength

VSAT uplink injection attacks exploit the fact that satellite transponders are typically “bent-pipe” — they amplify and retransmit whatever they receive on the uplink frequency, without authentication.

Testing approach (authorized lab environment only):

  • Characterize the target VSAT protocol (DVB-S2/DVB-RCS2, iDirect, Hughes, etc.) through passive analysis.
  • Replicate the signal structure in a lab environment using test equipment or SDR.
  • Assess whether the hub authenticates traffic from remote terminals at the physical layer, MAC layer, or only at higher protocol layers.
  • Test whether a rogue terminal can inject traffic into the network by mimicking legitimate terminal signaling.

Note: Actual uplink injection against operational satellites is illegal without authorization and can interfere with legitimate communications. Testing should be conducted in a lab environment with a satellite simulator or with explicit operator authorization during a maintenance window.

Replay Attacks

Replay attacks involve capturing legitimate satellite communications and retransmitting them later. Capture signals using hackrf_transfer -r capture.raw -f <freq> -s 20000000 -g 40, then analyze for anti-replay mechanisms: sequence numbers, timestamps, nonces, and session tokens. If the protocol lacks these mechanisms, retransmitting the captured signal may be accepted by the satellite system. This directly tests compliance with CCSDS 352.0 SDLS anti-replay requirements (see Frameworks & Standards).


Phase 6 — Reporting

Satellite penetration test reports require additional context that standard pentest reports do not address. The multi-segment nature of satellite systems, the regulatory environment, and the long lifecycle of space assets all influence how findings should be presented and prioritized.

Satellite-Specific Risk Scoring

Standard CVSS scoring does not adequately capture the risk of satellite-specific vulnerabilities. Augment CVSS with the following satellite-specific factors:

FactorLow (1)Medium (2)High (3)Critical (4)
Segment ImpactSingle terminalGround stationLink segmentSpace segment
Remediation DifficultySoftware patchFirmware update (ground)Protocol changeOn-orbit (no fix)
Cascade PotentialIsolated systemSingle operator affectedMultiple operatorsCross-sector impact
Regulatory ExposureInternal policyIndustry standardNational regulationInternational treaty
Mission ImpactDegraded performancePartial service lossFull service outagePermanent asset loss

Composite Satellite Risk Score = (CVSS Base Score * 0.4) + (Satellite Factors Average * 0.6)

This weighting reflects that satellite-specific factors (particularly remediation difficulty and cascade potential) often dominate the real-world risk more than traditional CVSS metrics.

Impact Assessment Across Segments

Each finding should be assessed for its potential impact across all satellite system segments, even if the vulnerability exists in only one segment:

graph LR
    V["Vulnerability<br/>(Ground Segment)"] --> I1["Direct Impact<br/>Ground station compromise"]
    I1 --> I2["Cascade Impact<br/>Unauthorized commanding"]
    I2 --> I3["Segment Impact<br/>Spacecraft compromise"]
    I3 --> I4["Mission Impact<br/>Service disruption"]
    I4 --> I5["Cross-Sector Impact<br/>GPS timing loss"]

    style V fill:#e74c3c,color:#fff
    style I1 fill:#e67e22,color:#fff
    style I2 fill:#f39c12,color:#fff
    style I3 fill:#9b59b6,color:#fff
    style I4 fill:#3498db,color:#fff
    style I5 fill:#2c3e50,color:#fff

Remediation Prioritization

Prioritize remediation based on the unique constraints of satellite systems:

  1. Immediate (0-30 days): Vulnerabilities exploitable remotely with no authentication that could lead to unauthorized commanding or service disruption. Ground segment network segmentation fixes.
  2. Short-term (30-90 days): Default credentials on accessible terminals, unencrypted management interfaces, missing authentication on APIs.
  3. Medium-term (90-180 days): Firmware vulnerabilities requiring coordinated update across deployed terminals, protocol-level issues requiring configuration changes.
  4. Long-term (180+ days): Architectural issues requiring ground system redesign, on-orbit vulnerabilities that can only be mitigated (not fixed), standards compliance gaps requiring policy and process changes.
  5. Next mission (design phase): Vulnerabilities in the space segment that cannot be remediated on orbit. Document for incorporation into successor mission design requirements.

Pentest Checklist by Segment

The following comprehensive checklists provide a structured approach to satellite penetration testing for each system segment.

Space Segment Checklist

#Test ItemTechniqueToolsRisk Level
S1Flight software analysis (if test unit available)Static analysis, reverse engineeringGhidra, IDA Pro, Binary NinjaCritical
S2Spacecraft bus protocol securityProtocol analysis of test interfacesWireshark, custom parsersCritical
S3Command authentication mechanism reviewProtocol analysis, documentation reviewN/A (design review)Critical
S4Telemetry encryption assessmentPassive signal analysis, documentation reviewGNU Radio, SatDumpHigh
S5Software update mechanism securityFirmware update process analysisbinwalk, firmware-mod-kitCritical
S6Redundancy/failover securitySafe mode trigger analysisN/A (design review)High
S7Supply chain component analysisHardware inspection, provenance verificationX-ray, decapping (specialized)High
S8Side-channel analysis (if hardware available)Power analysis, EM emanationChipWhisperer, oscilloscopeMedium

Ground Segment Checklist

#Test ItemTechniqueToolsRisk Level
G1Network segmentation validationNetwork scanning, VLAN hoppingnmap, YersiniaCritical
G2Ground station authenticationCredential testing, brute forceHydra, Burp SuiteCritical
G3TT&C system access controlsPrivilege escalation, RBAC testingManual testingCritical
G4VSAT terminal default credentialsCredential testing against known defaultsCustom scripts, HydraHigh
G5VSAT terminal firmware analysisFirmware extraction, reverse engineeringbinwalk, GhidraHigh
G6Web management interface testingOWASP methodologyBurp Suite, ZAPHigh
G7SCADA/ICS component assessmentModbus/SNMP testingMetasploit, nmap scriptsHigh
G8Key management infrastructureHSM configuration review, key storageManual reviewCritical
G9Physical security assessmentSite survey, access control testingPhysical pentest toolsMedium
G10Remote access securityVPN testing, MFA validationnmap, OpenVPN auditHigh
G11Satellite management API testingOWASP API Top 10 methodologyBurp Suite, PostmanHigh
G12Database security (orbit/telemetry data)SQL injection, access control testingsqlmap, manual testingMedium

User Segment Checklist

#Test ItemTechniqueToolsRisk Level
U1Terminal hardware securityJTAG/UART access, debug interface identificationJTAGulator, Bus PirateHigh
U2Terminal firmware extractionSPI flash dump, eMMC accessflashrom, ch341a programmerHigh
U3Terminal firmware analysisReverse engineering extracted firmwarebinwalk, Ghidra, stringsHigh
U4Terminal web interface testingStandard web app pentestBurp Suite, ZAPMedium
U5Terminal default credentialsTest against vendor default listsManual, HydraMedium
U6Mobile app securityOWASP Mobile Top 10MobSF, Frida, objectionMedium
U7Terminal-to-hub authenticationProtocol analysisWireshark, SDRHigh
U8Local network exposureTest what local network services terminals exposenmap, netcatMedium
U9Secure boot validationAttempt to boot modified firmwareHardware tools, JTAGHigh
U10GPS receiver spoofing resilienceGPS spoofing testHackRF, GPS-SDR-SIMHigh
#Test ItemTechniqueToolsRisk Level
L1Encryption presence verificationPassive signal analysisSDR, GNU RadioCritical
L2Protocol identificationSignal analysis, parameter extractionSatDump, inspectrumMedium
L3Anti-replay mechanism assessmentCapture and replay testing (authorized)HackRF, GNU RadioHigh
L4Key rotation frequencyDocumentation review, long-term monitoringManual reviewMedium
L5Uplink authentication assessmentProtocol analysisSDR, custom toolsCritical
L6Jamming resilience testingControlled interference testing (authorized)Signal generator, SDRHigh
L7Spoofing detection capabilityGPS/GNSS spoofing testHackRF, GPS-SDR-SIMHigh
L8Inter-satellite link securityDesign review (if accessible)N/A (design review)Medium
L9Unencrypted data exposurePassive monitoring for cleartext dataSDR, WiresharkHigh
L10Signal authentication mechanismProtocol analysisGNU Radio, custom toolsCritical

Satellite penetration testing carries legal risks that substantially exceed those of traditional IT pentesting. The following table summarizes the key legal considerations by activity:

ActivityLegal Status (US)Authorization RequiredRegulatory Body
OSINT / public data collectionLegalNoneN/A
Passive RF receptionGenerally legalNone (but interception of content may violate ECPA)FCC
Internet scanning of ground infrastructureLegal with authorizationWritten authorization from system ownerN/A (CFAA)
VSAT terminal hardware hacking (own equipment)LegalOwnershipFCC (if transmitting)
VSAT terminal hardware hacking (client equipment)Legal with authorizationWritten authorizationN/A (CFAA)
Active RF transmission (satellite frequencies)Requires licenseFCC experimental license + operator authorizationFCC
GPS spoofing (shielded environment)Legal gray areaOperator authorization, shielded environmentFCC
GPS spoofing (over-the-air)Illegal (18 USC 32)Generally not authorizedFCC, DOJ
Satellite uplink injectionRequires licenseFCC license + operator authorizationFCC
Jamming of any kindIllegal (47 USC 333)No authorization possible for commercial entitiesFCC

Critical reminder: The FCC has imposed fines exceeding $100,000 for unauthorized transmissions on satellite frequencies. GPS jamming and spoofing carry criminal penalties under 18 USC 32. Always consult legal counsel before conducting active RF testing.


Further Reading


For the frameworks and compliance standards that inform satellite pentest requirements, see Frameworks & Standards. For the specific attack vectors tested during satellite pentests, see Attack Vectors. For a comprehensive list of tools, see Tools & Resources.