Skip to content
Ships
Shodan searches
- org:"Inmarsat Solutions US"
- Login for Globe wireless
- title:"sailor 900"
- Sat antenna details
- Exploit: https://www.exploit-db.com/exploits/35932
- Default credentials: admin/1234
- html:commbox
- KVH CommBox terminals
- Vessel name / network structure leaked
- "Show Users" link (or can request the content by appending /rest.php?action=QCgetActiveUsers)
Vuln Ship Tracker
- https://ptp-shiptracker.herokuapp.com/
Terms
ECDIS
are the electronic chart systems that are needed to navigate.
AIS transceiver
- system that ships use to avoid colliding with each other.
NMEA 0183
messages
- Ethernet and serial networks are often ‘bridged’ at several points (GPS,satcom terminal, ECDIS)
- OT systems are used to control the steering gear, engines, ballast pumps and lots more.
- They communicate using NMEA 0183 messages.
- No message authentication, encryption or validation (only 2 byte XOR checksum)
Attack Patterns
- Spoof the
ECDIS
using the vulnerable config interface, 'grow' the ship and 'jump' it in to the shipping lanes.
- Other ships AIS will alert the ships captain to a collision scenario
- MitM and change NMEA 0183 messages to read differently
- Ex: change the rudder command by modifying a GPS autopilot command
References
Summarized References
- https://www.pentestpartners.com/security-blog/osint-from-ship-satcoms/
- https://www.pentestpartners.com/security-blog/hacking-tracking-stealing-and-sinking-ships/