← Back to Satellite Security

Tools & Resources

16 min read

Overview

Satellite security research sits at the intersection of radio frequency engineering, embedded systems, network security, and aerospace domain knowledge. The barrier to entry has dropped dramatically since 2015 — a functional satellite ground station for security research can now be assembled for under $100, and most of the critical software tools are open source. This page catalogs the hardware platforms, software tools, research papers, and community resources that form the foundation of satellite security work.

The tools are organized by function: SDR hardware for signal capture and transmission, software for signal processing and decoding, satellite-specific utilities for tracking and protocol analysis, OSINT platforms for reconnaissance, embedded security tools for firmware and hardware analysis, and simulation platforms for safe experimentation.


SDR Hardware Platforms

Software-Defined Radio (SDR) hardware is the single most important equipment category for satellite security research. SDRs replace traditional analog radio components with digital signal processing, allowing a single device to receive (and sometimes transmit) across a wide frequency range. The choice of SDR determines what satellite signals you can capture, whether you can perform active testing, and the quality of your analysis.

Hardware Comparison

DevicePrice (USD)TX/RXFrequency RangeMax BandwidthADC ResolutionUse Case
RTL-SDR V3/V4~$30RX only24 MHz – 1.766 GHz2.4 MHz8-bitL-band reception, NOAA/Meteor weather satellites, ADS-B, beginner satellite work
Nooelec NESDR SMArt~$25RX only25 MHz – 1.75 GHz2.4 MHz8-bitBudget alternative to RTL-SDR, good thermal stability with aluminum enclosure
Airspy Mini~$100RX only24 MHz – 1.8 GHz6 MHz12-bitSuperior dynamic range for congested bands, better sensitivity for weak satellite signals
ADALM-Pluto (PlutoSDR)~$200TX/RX325 MHz – 3.8 GHz20 MHz12-bitLearning platform with transmit capability, ideal for lab-based satellite protocol research
LimeSDR Mini~$200TX/RX (Full Duplex)10 MHz – 3.5 GHz30.72 MHz12-bitFull-duplex operation for simultaneous TX/RX, protocol fuzzing
HackRF One~$350TX/RX (Half Duplex)1 MHz – 6 GHz20 MHz8-bitWidest frequency coverage, essential for active testing, GPS simulation, C-band work
Ettus USRP B210~$2,000TX/RX (Full Duplex)70 MHz – 6 GHz56 MHz12-bitProfessional-grade research, 2x2 MIMO, highest bandwidth, used by government labs

Detailed Platform Notes

RTL-SDR V3/V4 — The de facto starting point for satellite security research. Based on the Realtek RTL2832U chipset, these dongles were originally designed for DVB-T television reception but were repurposed by the open-source community for wideband reception. The V3 added direct sampling mode for HF reception (below 24 MHz), and the V4 improved filtering and added a built-in notch filter for broadcast FM rejection. For satellite work, the RTL-SDR can receive Inmarsat signals on L-band (~1.5 GHz), decode NOAA APT weather imagery, capture ADS-B aircraft transponder data, and monitor some satellite downlinks. Its 8-bit ADC limits dynamic range compared to higher-end options, but for initial learning and passive reconnaissance, nothing beats the price-to-capability ratio.

HackRF One — The most versatile single-board SDR for satellite security testing. Its 1 MHz to 6 GHz range covers nearly every satellite frequency band used in practice: L-band (1–2 GHz), S-band (2–4 GHz), and C-band (4–8 GHz, partial). Transmit capability is critical for active testing scenarios including GPS signal simulation, protocol fuzzing of ground terminals, and replay attacks against satellite modems. The 8-bit ADC is its primary limitation — for signals requiring high dynamic range, the Ettus B210 or even the Airspy Mini will outperform it on the receive side. Great Scott Gadgets maintains the hardware design as open source.

Ettus USRP B210 — The professional standard for satellite security research labs. The 56 MHz of instantaneous bandwidth allows capture of wideband satellite transponders in a single acquisition. The 2x2 MIMO configuration enables direction-finding and diversity reception techniques. Full-duplex operation means you can transmit a spoofed signal while simultaneously monitoring the target’s response. The B210 integrates with GNU Radio through the UHD (USRP Hardware Driver) framework, which is extensively documented and supported. Government agencies, defense contractors, and university research labs standardize on USRP hardware for its reliability and performance.

Essential Accessories

Beyond the SDR itself, satellite signal reception requires additional hardware:

  • LNA (Low Noise Amplifier) — Satellite signals arrive at Earth’s surface extremely weak (often below the noise floor). An LNA placed close to the antenna boosts the signal before cable losses degrade it. The Nooelec SAWbird+ LNA ($35) is purpose-built for L-band satellite reception. For S-band work, a broadband LNA like the SPF5189Z ($15) provides adequate gain.
  • Bandpass Filters — Isolate the satellite band of interest and reject interference from cellular towers, broadcast FM, and other strong local signals. Critical when operating near urban environments.
  • Antennas — A simple V-dipole or QFH (Quadrifilar Helix) antenna works for VHF weather satellites. L-band Inmarsat reception requires a patch antenna or small dish. C-band and Ku-band work requires parabolic dishes (0.6m–1.2m) with appropriate feed horns.
  • Bias Tee — Powers the LNA through the coaxial cable from the SDR. The RTL-SDR V3/V4 has a built-in software-switchable bias tee. For other SDRs, an external bias tee (~$10) is needed.

SDR Software

GNU Radio

GNU Radio is the foundational open-source signal processing framework for satellite security research. It provides a graphical flowgraph editor (GNU Radio Companion / GRC) and a Python/C++ runtime for building custom signal processing chains. Nearly every satellite-specific tool listed below builds on GNU Radio or interfaces with it.

Key capabilities for satellite work:

  • Demodulation of FM, AM, PSK, QAM, and OFDM signals used by satellite systems
  • Custom protocol decoders for proprietary satellite link layers
  • Real-time and recorded (file-based) signal processing
  • Integration with all major SDR hardware through OsmoSDR, UHD, and SoapySDR interfaces
  • Extensive block library for filtering, resampling, synchronization, and error correction
# Install GNU Radio on Ubuntu/Debian
sudo apt install gnuradio

# Launch the graphical flowgraph editor
gnuradio-companion

# Run a flowgraph from the command line
python3 my_satellite_decoder.py

SDR++

SDR++ is a cross-platform, general-purpose SDR receiver application with a modern interface. It serves as the “first look” tool when you want to visually explore a frequency band and identify satellite signals before building a dedicated decoder. SDR++ supports waterfall displays, multiple VFOs (Virtual Frequency Oscillators), and a plugin architecture for adding demodulators. It is significantly faster and more responsive than the older SDR# (Windows-only) and GQRX applications.

SatDump

SatDump is the premier open-source tool for decoding satellite signals, with particular strength in weather satellite imagery. It supports decoding of:

  • NOAA POES — APT (Automatic Picture Transmission) on 137 MHz
  • Meteor-M — LRPT (Low Rate Picture Transmission) on 137 MHz
  • NOAA GOES — HRIT/LRIT on L-band (1694 MHz)
  • EUMETSAT Metop — HRPT (High Rate Picture Transmission) on L-band
  • FengYun — Chinese weather satellite imagery
  • Inmarsat — AERO/ACARS messaging decoding on L-band

SatDump can operate in real-time with an SDR or process recorded baseband files. For security researchers, SatDump demonstrates practical satellite signal interception — the decoded weather imagery and messaging data prove that satellite downlinks are receivable with consumer equipment.

# Install SatDump (AppImage or from source)
git clone https://github.com/SatDump/SatDump.git
cd SatDump && mkdir build && cd build
cmake .. && make -j$(nproc)

# Decode a recorded Meteor-M2 LRPT baseband file
satdump meteor_m2_lrpt baseband recorded_signal.raw --samplerate 2400000

SDRangel

SDRangel is a multi-channel SDR receiver and transmitter application. Its distinguishing feature is the ability to run multiple independent receive channels simultaneously from a single SDR, which is useful for monitoring several satellite signals at once. It includes built-in demodulators for ADS-B, AIS, APRS, and various digital voice modes, plus a channel analyzer for unknown signal identification.

CubicSDR

CubicSDR provides a clean, minimal interface for SDR reception with waterfall visualization. It uses SoapySDR as its hardware abstraction layer, giving it broad device compatibility. Less feature-rich than SDR++ but useful as a lightweight alternative.


Satellite-Specific Tools

GPS-SDR-SIM

GPS-SDR-SIM generates GPS L1 C/A baseband signals that can be transmitted using a HackRF One or other TX-capable SDR to simulate GPS satellite constellations. This is the primary tool for GPS spoofing research and testing GPS receiver resilience.

Capabilities:

  • Simulate any location on Earth at any time
  • Generate signals for up to 12 GPS satellites simultaneously
  • Support static position, dynamic trajectory (from NMEA or user-defined motion files), and RINEX ephemeris data
  • Output I/Q samples at 2.6 MHz sample rate for HackRF transmission
# Clone and build
git clone https://github.com/osqzss/gps-sdr-sim.git
cd gps-sdr-sim && gcc gpssim.c -lm -O3 -o gps-sdr-sim

# Generate GPS signal for a specific location (latitude, longitude, altitude)
./gps-sdr-sim -e brdc3540.14n -l 38.8977,−77.0365,100 -o gpssim.bin

# Transmit with HackRF (L1 frequency = 1575.42 MHz)
hackrf_transfer -t gpssim.bin -f 1575420000 -s 2600000 -a 1 -x 0

Legal Warning: Transmitting simulated GPS signals is illegal in most jurisdictions unless done in a shielded/anechoic environment. GPS-SDR-SIM is intended for controlled laboratory testing only. Even low-power transmissions can disrupt GPS receivers in a wide radius.

GNSS-SDR

GNSS-SDR is an open-source Global Navigation Satellite System receiver implemented entirely in software. Unlike GPS-SDR-SIM (which generates signals), GNSS-SDR processes received satellite signals to compute position, velocity, and time. Security researchers use it to:

  • Analyze GPS/GLONASS/Galileo/BeiDou signal structures
  • Implement and test spoofing detection algorithms
  • Study signal authentication mechanisms (e.g., Galileo OSNMA)
  • Process recorded RF data for forensic analysis of spoofing incidents

gr-satellites

gr-satellites is a GNU Radio out-of-tree module containing decoders for over 100 amateur and research satellites. It handles the full signal processing chain from RF samples to decoded telemetry frames. For security researchers, gr-satellites provides working implementations of the modulation, coding, and framing schemes used by real satellites — invaluable for understanding how satellite links work at the protocol level and identifying where security controls are (or aren’t) implemented.

Supported protocols include: AX.25, GOMspace CSP, CCSDS, HDLC, USP, and numerous proprietary telemetry formats.

# Install gr-satellites
pip install gr-satellites

# Decode a specific satellite from recorded IQ data
gr_satellites 'NOAA 15' --wavfile recording.wav --samp_rate 48000

SatNOGS

SatNOGS (Satellite Networked Open Ground Station) is an open-source project that builds and operates a global network of automated satellite ground stations. The network consists of hundreds of volunteer-operated stations that schedule and execute satellite passes, recording the received signals and uploading them to a central database.

Security research applications:

  • Access a global archive of recorded satellite transmissions without building your own ground station
  • Study satellite telemetry patterns over time to identify anomalies
  • Contribute observations to community tracking of satellite behavior
  • Use the SatNOGS DB API to programmatically query satellite transmissions

The SatNOGS hardware design uses RTL-SDR receivers with automated antenna rotators, demonstrating that satellite signal interception can be done at scale with commodity equipment.

Satellite Tracking Tools

ToolTypePurpose
gpredictDesktop applicationReal-time satellite tracking, pass prediction, antenna rotator control. Essential for knowing when a target satellite is overhead.
OrbitronDesktop application (Windows)Satellite tracking with TLE updates, widely used in amateur radio community
StellariumDesktop applicationVisual astronomy tool that includes satellite tracking — useful for dish alignment
PyEphem / SkyfieldPython librariesProgrammatic satellite position calculation for scripting automated observations

OSINT & Reconnaissance Tools

Satellite security assessments begin with open-source intelligence gathering. The following tools support reconnaissance of both space and ground segments.

Space Segment OSINT

ResourceURLData Provided
Space-Track.orgspace-track.orgTwo-Line Element (TLE) orbital data, conjunction assessments, decay predictions. Requires free registration. Official source from 18th Space Defense Squadron.
CelesTrakcelestrak.orgCurated TLE data sets, supplemental orbital data, satellite catalog. Dr. T.S. Kelso’s long-running resource.
N2YOn2yo.comReal-time satellite tracking, pass predictions, 3D visualization. No registration required.
In-The-Sky.orgin-the-sky.orgSatellite pass predictions, visible satellite finder, orbital element database
UCS Satellite Databaseucsusa.org/satellite-databaseComprehensive database of active satellites with operator, purpose, orbit type, and launch date
SatBeamssatbeams.comSatellite transponder frequency plans, footprint maps, EIRP contours — essential for identifying which frequencies a satellite uses
LyngSatlyngsat.comDetailed listings of satellite TV and radio channels with frequencies, symbol rates, and FEC parameters

Ground Segment OSINT

ToolPurpose
ShodanDiscover internet-connected satellite ground infrastructure: VSAT terminals, ground station control interfaces, satellite modem management pages. Search queries like "Hughes" port:80, "iDirect" http.title, or "Newtec" port:443 reveal exposed management interfaces.
CensysSimilar to Shodan with certificate-based discovery. Useful for finding TLS certificates issued to satellite operators and identifying their internet-facing infrastructure.
RIPE/ARIN/BGP toolsIdentify IP address allocations belonging to satellite operators. Satellite ISPs have distinct AS numbers and IP ranges that can be enumerated.
Wigle.netWardriving database that can identify satellite uplink locations by correlating WiFi access point locations with known ground station sites.

OSINT Methodology for Satellite Targets

flowchart TD
    A["Identify Target Satellite"] --> B["Retrieve TLEs from Space-Track"]
    B --> C["Determine Frequencies from SatBeams/LyngSat"]
    C --> D["Calculate Pass Windows with gpredict"]
    D --> E["Scan Ground Infrastructure with Shodan/Censys"]
    E --> F["Identify Operator IP Ranges via ARIN/RIPE"]
    F --> G["Map Attack Surface: Space + Ground + User"]
    G --> H["Cross-reference with known vulnerabilities"]

Embedded & Reverse Engineering Tools

Satellite terminals, modems, and ground station controllers are embedded systems. When physical access to this equipment is obtained (through purchase of commercial VSAT terminals, decommissioned hardware, or authorized penetration testing), the following tools enable firmware extraction and analysis.

Firmware Extraction & Analysis

ToolPurposeSatellite Application
BinwalkFirmware image extraction and analysis. Identifies embedded file systems, compressed archives, and executable code within binary firmware dumps.Extract firmware from satellite modem flash dumps, identify embedded Linux file systems in VSAT terminals
Firmware Analysis Toolkit (FAT)Automated firmware emulation using QEMUEmulate extracted satellite modem firmware for dynamic analysis without requiring physical hardware
JeffersonJFFS2 filesystem extractionMany satellite embedded systems use JFFS2; Jefferson extracts the contents
ubi_readerUBI/UBIFS filesystem extractionCommon in newer NAND-flash-based satellite terminals

Reverse Engineering

ToolPurposeSatellite Application
GhidraNSA’s open-source reverse engineering framework. Supports ARM, MIPS, PowerPC — the processor architectures used in satellite hardware.Analyze satellite modem firmware for hardcoded credentials, backdoors, undocumented commands
IDA ProCommercial disassembler and decompiler (industry standard)Professional-grade firmware reverse engineering
Radare2 / RizinOpen-source reverse engineering frameworkScriptable analysis of satellite firmware binaries
Binary NinjaCommercial reverse engineering platform with modern UIInteractive firmware analysis with good automation APIs

Hardware Interfaces

ToolPurposeSatellite Application
Bus PirateUniversal bus interface (UART, SPI, I2C, JTAG)Connect to debug ports on satellite modem circuit boards
JTAG/SWD Debuggers (J-Link, ST-Link, OpenOCD)On-chip debugging interfacesExtract firmware directly from processor memory, set breakpoints, inspect runtime state
Logic Analyzers (Saleae, DSLogic)Capture and decode digital bus trafficReverse-engineer communication between satellite modem components
ChipWhispererSide-channel analysis and fault injectionTest satellite hardware for power analysis and glitching vulnerabilities

Firmware Analysis Workflow

flowchart TD
    A["Obtain Satellite Terminal Hardware"] --> B["Identify Debug Ports<br/>(UART, JTAG, SWD)"]
    B --> C["Extract Firmware via JTAG<br/>or Flash Chip Desolder"]
    C --> D["Analyze with Binwalk<br/>(identify filesystems, compression)"]
    D --> E["Extract Filesystem<br/>(squashfs, JFFS2, UBIFS)"]
    E --> F["Static Analysis in Ghidra<br/>(identify credentials, protocols)"]
    F --> G["Emulate with QEMU/FAT<br/>(dynamic testing)"]
    G --> H["Identify Vulnerabilities<br/>(hardcoded creds, command injection, buffer overflows)"]

Simulation & Testing Platforms

Conducting security research against live satellites carries legal, safety, and ethical risks. Simulation platforms allow researchers to test attacks and defenses in controlled environments.

COSMOS (Ball Aerospace / OpenC3)

COSMOS (now maintained as OpenC3) is a command and telemetry system originally developed by Ball Aerospace. It provides a complete ground system for commanding and monitoring spacecraft, and is used by many CubeSat and small satellite programs. Security researchers use COSMOS to:

  • Set up realistic satellite command and telemetry environments
  • Test command injection attacks against simulated spacecraft
  • Develop and validate intrusion detection rules for satellite communications
  • Practice incident response scenarios for satellite operations
# Install OpenC3 via Docker
git clone https://github.com/OpenC3/cosmos.git
cd cosmos && ./openc3.sh start
# Access web interface at http://localhost:2900

OpenSatKit

OpenSatKit integrates NASA’s core Flight System (cFS) with COSMOS to provide a complete satellite simulation environment. cFS is the actual flight software framework used on many NASA missions and CubeSats. OpenSatKit allows researchers to:

  • Run realistic satellite flight software on desktop hardware
  • Send commands and receive telemetry using standard CCSDS protocols
  • Test attacks against cFS applications (command spoofing, telemetry manipulation)
  • Develop security extensions for the cFS framework

42 (NASA Goddard)

42 is a spacecraft attitude simulation developed by NASA Goddard Space Flight Center. It simulates multi-body spacecraft dynamics, orbital mechanics, sensor models, and actuator models. While primarily an engineering tool, 42 is relevant to security research involving:

  • Attitude determination and control system (ADCS) spoofing attacks
  • Star tracker and sun sensor manipulation
  • GPS spoofing effects on spacecraft navigation

Systems Tool Kit (STK)

STK (formerly Satellite Tool Kit) by Ansys/AGI is the industry-standard commercial platform for satellite mission analysis. The free tier provides:

  • Satellite orbit visualization and analysis
  • Link budget calculations for satellite communications
  • Coverage analysis (which ground areas a satellite can serve)
  • Conjunction analysis for space situational awareness

The commercial tiers add RF propagation modeling, radar cross-section analysis, and multi-domain scenario planning used by defense organizations.


Key Research Papers

The following papers represent foundational and landmark research in satellite security. Every serious satellite security researcher should be familiar with these works.

YearAuthorsTitleVenue / PublisherKey Contribution
2014Ruben SantamartaA Wake-Up Call for SATCOM SecurityIOActive / Black Hat USAFirst systematic analysis of SATCOM terminal vulnerabilities. Found hardcoded credentials, backdoors, and insecure protocols in terminals from Harris, Hughes, Cobham, Thuraya, JRC, and Iridium.
2018Ruben SantamartaLast Call for SATCOM SecurityIOActive / Black Hat USAFollow-up proving remote exploitation of SATCOM terminals. Demonstrated that vulnerabilities disclosed in 2014 remained largely unpatched.
2020James Pavur et al.A Tale of Sea and Sky: On the Security of Maritime VSAT CommunicationsIEEE S&P (Oakland) / Oxford UniversityDemonstrated interception of unencrypted maritime VSAT traffic using a $300 home TV satellite setup. Captured crew PII, ship positions, and operational data from vessels worldwide.
2023Johannes Willbold et al.Space Odyssey: An Experimental Software Security Analysis of SatellitesIEEE S&P (Oakland) / Ruhr University BochumFirst security analysis of firmware from real satellites (ESTCube-1, OPS-SAT, Flying Laptop). Found complete absence of encryption, authentication, and presence of known CVEs.
2023Gabriele Oligeri et al.GPS Spoofing Detection TechniquesVarious / Multiple institutionsSurvey and evaluation of GPS spoofing detection methods including signal strength monitoring, multi-receiver correlation, and inertial navigation cross-checks.
2019Humphreys et al.The Texas Spoofing Test BatteryUniversity of Texas at AustinSystematic GPS spoofing detection evaluation framework with standardized test scenarios.
2022Falco et al.Cybersecurity Principles for Space SystemsAIAA Journal of Aerospace Information SystemsComprehensive framework for applying cybersecurity principles to space system design, bridging the gap between IT security and aerospace engineering.
2015Costin & FrancillonGhost in the Air(Traffic)Black Hat USAAnalysis of ADS-B security weaknesses and demonstration of aircraft position spoofing and injection attacks via SDR.

Community & Learning Resources

Capture-The-Flag & Challenges

Hack-A-Sat — The premier satellite security CTF competition, organized by the US Air Force and Space Force. Running since 2020, Hack-A-Sat challenges cover satellite bus exploitation, ground system attacks, RF signal processing, orbital mechanics, and flight software reverse engineering. The 2023 competition featured Moonlighter, the first on-orbit satellite designed to be hacked.

Conferences & Villages

EventFocus
DEF CON Aerospace VillageHands-on satellite hacking workshops, SATCOM terminal teardowns, GPS spoofing demos
DEF CON Satellite Hacking VillageDedicated satellite security talks and capture-the-flag challenges
ShmooConOccasional satellite and space security presentations
CyberSat SummitIndustry-focused satellite cybersecurity conference
Small Satellite Conference (SmallSat)Utah State University annual conference with growing cybersecurity track

Information Sharing

  • Space ISAC (Space Information Sharing and Analysis Center) — Industry consortium for sharing satellite and space system threat intelligence. Membership-based, operated by the National Cybersecurity Center.
  • CISA Space Systems Cybersecurity — US government guidance and alerts relevant to satellite infrastructure.

Online Communities

CommunityPlatformFocus
r/RTLSDRRedditSDR hardware, satellite reception, signal identification
r/SatelliteHackingRedditSatellite security research discussion
r/ADSBRedditAircraft tracking via satellite and terrestrial systems
SatNOGS CommunityDiscourse forumGround station operation, satellite signal decoding
GNU Radio DiscussMailing list / DiscourseSignal processing questions, custom decoder development
Hack-A-Sat DiscordDiscordCompetition discussion, year-round satellite security community

Books

TitleAuthorsRelevance
Satellite Communications (4th ed.)Timothy Pratt, Charles Bostian, Jeremy AllnuttComprehensive textbook covering link budgets, modulation, orbital mechanics, and system design. Essential foundation for understanding what you’re attacking or defending.
Space Mission Engineering: The New SMADJames R. Wertz et al.The “bible” of space systems engineering. Covers every subsystem of a spacecraft including communications, command and data handling, and ground systems.
The Satellite Hacker’s HandbookVarious (community)Practical guides for satellite signal reception, decoding, and analysis
Software-Defined Radio for EngineersTravis Collins et al. (Analog Devices)Free textbook covering SDR theory and practice with ADALM-Pluto exercises
Digital Signal Processing using Arm Cortex-M based MicrocontrollersCem Ünsalan, M. Erkin YücelRelevant for understanding DSP in embedded satellite systems

For newcomers to satellite security, the following progression builds skills incrementally from passive reception to active security research.

Phase 1: Passive Reception (Weeks 1–4)

Equipment: RTL-SDR V3/V4 ($30) + V-dipole antenna (included) + laptop

  1. Install SDR++ and familiarize yourself with the waterfall display and basic receiver operation
  2. Receive NOAA weather satellite APT images on 137 MHz — this provides immediate visual feedback and teaches satellite pass timing, Doppler correction, and signal processing basics
  3. Install SatDump and decode Meteor-M2 LRPT imagery for higher-resolution results
  4. Use gpredict to track satellite passes and understand orbital mechanics
  5. Receive ADS-B aircraft transponder signals (1090 MHz) to understand digital signal decoding

Phase 2: L-Band and Digital Signals (Weeks 5–8)

Equipment: Add an L-band patch antenna ($30) + LNA ($35)

  1. Receive Inmarsat signals at 1545 MHz — decode AERO and ACARS messages using SatDump
  2. Receive GOES HRIT/LRIT weather data at 1694 MHz for full-disc Earth imagery
  3. Begin learning GNU Radio fundamentals — build simple flowgraphs for FM demodulation, then progress to digital demodulators
  4. Study gr-satellites to understand how satellite protocol decoders are implemented

Phase 3: Active Research (Weeks 9–16)

Equipment: Add HackRF One ($350) or ADALM-Pluto ($200)

  1. Set up GPS-SDR-SIM in a shielded environment and understand GPS signal structure
  2. Install GNSS-SDR and process live GPS signals to understand receiver operation
  3. Build custom GNU Radio flowgraphs for satellite signal analysis
  4. Study the Santamarta and Pavur papers in detail
  5. Obtain a used VSAT terminal (eBay, surplus) and begin hardware analysis with Binwalk and Ghidra

Phase 4: Advanced Research (Ongoing)

Equipment: Consider Ettus USRP B210 for professional-grade work

  1. Participate in Hack-A-Sat qualifiers
  2. Set up OpenSatKit/COSMOS for satellite simulation
  3. Contribute to SatNOGS ground station network
  4. Develop and publish original research
  5. Engage with Space ISAC and DEF CON Aerospace Village communities

For details on how these tools apply to offensive satellite security assessments, see Penetration Testing and Red Teaming. For defensive applications, see Defenses & Mitigations.


Tool Selection by Assessment Type

Different satellite security engagements require different tool combinations. The following table maps assessment types to recommended tool loadouts.

Assessment TypeSDR HardwareKey SoftwareAdditional Hardware
Passive ReconnaissanceRTL-SDR V3/V4SDR++, SatDump, gpredictL-band patch antenna, LNA
VSAT Terminal AssessmentHackRF OneBinwalk, Ghidra, NmapBus Pirate, JTAG debugger, logic analyzer
GPS Security TestingHackRF OneGPS-SDR-SIM, GNSS-SDRShielded enclosure (mandatory), GPS receivers under test
Ground Station PentestN/A (network-based)Shodan, Nmap, Metasploit, Burp SuiteStandard pentest laptop
Link Layer AnalysisUSRP B210GNU Radio, gr-satellites, custom decodersAppropriate antenna for target band, LNA chain
Full Satellite System AuditUSRP B210 + HackRFAll of the above + COSMOS/OpenSatKitAnechoic chamber access for TX testing

Satellite security tools exist on a spectrum from purely passive (receiving publicly broadcast signals) to actively transmitting (which introduces legal risk). Understanding where each tool falls is critical:

  • Always Legal (in most jurisdictions): Receiving and decoding unencrypted satellite signals (weather satellites, Inmarsat ACARS, ADS-B). Satellite tracking and OSINT. Firmware analysis of hardware you own.
  • Restricted: Transmitting on any frequency requires appropriate licensing (amateur radio license for amateur bands, experimental license for others). GPS simulation must occur in shielded environments.
  • Prohibited without Authorization: Active attacks against satellite ground infrastructure. Interference with satellite communications. Unauthorized access to satellite control systems.

Always operate within the bounds of applicable law, including the ITU Radio Regulations, national telecommunications law, and computer fraud statutes. For authorized security assessments, obtain explicit written permission that covers both the network/cyber scope and any RF transmission activities.