Air Traffic Software Vulnerable to DoS Attacks

  • Thread starter Thread starter Guest
  • Start date Start date
Status
Not open for further replies.
[citation][nom]drwho1[/nom]Is Tom's doing now a "terrorist hand book"?Why tell the world how to attack airplanes or airports?[/citation]
Attacker don't need any help from Tom's.It's always good to know the vulnerability of any standards deployed in commercial systems
 
[citation][nom]drwho1[/nom]Is Tom's doing now a "terrorist hand book"?Why tell the world how to attack airplanes or airports?[/citation]
So...we will just ignore this issue and act like it is not there and eventually it will go away right? Yeah I didn't think so.

More than likely this vulnerability was revealed long time ago and reported to the affected facilities since he is a "Security researcher" and that is his job to find exploits.
 
Don't forget that the FAA uses multiple types of sensors though. There are still long and short range radars that operate both cooperatively (transponders) and noncooperatively (traditional reflection-based radar).
 
This is very theoretical, and one should remember that ATC procedures were designed before radar era. So there are many options to cope with such situation. Revert to the good old Mode C for instance, and if the problem persists, lighten the traffic to cope with the situation (stop takeoffs), until the so-called pirates are located and arrested.

For such a thing, this should not last very long, and if you check the local regulations, you'll see that this kind of jokes can send someone in jail for very very long...
 
[citation][nom]ATPL[/nom]This is very theoretical, and one should remember that ATC procedures were designed before radar era. So there are many options to cope with such situation. Revert to the good old Mode C for instance, and if the problem persists, lighten the traffic to cope with the situation (stop takeoffs), until the so-called pirates are located and arrested.For such a thing, this should not last very long, and if you check the local regulations, you'll see that this kind of jokes can send someone in jail for very very long...[/citation]
I'm glad someone besides me was able to point this out before someone read this and started freaking the F out....which seems to happen all too often.
 
[citation][nom]drwho1[/nom]Is Tom's doing now a "terrorist hand book"?Why tell the world how to attack airplanes or airports?[/citation]lol you make me laugh
 
If this is true - it would only work in an ADS B environment - many stations have various types of surveillance......
 
[citation][nom]Kami3k[/nom]Why the FUCK are they connected to the internet in the first place?![/citation]
Air traffic controllers are also responsible for updating the airline's Twitter page.
 
[citation][nom]Kami3k[/nom]Why the FUCK are they connected to the internet in the first place?![/citation]
They're not. They use radio broadcasts. Anyone can transmit or receive radio signals. If they are unencrypted, you can understand them too.

Reading fail, eh?
 
[citation][nom]eddieroolz[/nom]You'd think these systems would be offline from the general network...[/citation]
They need some internets too you know!!
 
[citation][nom]drwho1[/nom]Is Tom's doing now a "terrorist hand book"?Why tell the world how to attack airplanes or airports?[/citation]

If Tom's Hardware figured it out, then hackers would've known months ago.

Every countermeasure against a security problem risk informing everyone what the problem is, and often times the risk is worth it.
 
Status
Not open for further replies.