<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber Range for Space Systems: Training Scenarios for Satellite Cybersecurity Preparedness</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matteo Ciccaglione</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lorenzo Bracciale</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pierpaolo Loreti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arianna Miraval Zanon</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>ASI - Agenzia Spaziale Italiana</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DICII, Tor Vergata University of Rome</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Electronic Engineering, University of Rome Tor Vergata</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Laboratory of Network Assessment</institution>
          ,
          <addr-line>Assurance and Monitoring, CNIT, Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The increasing exposure of satellite systems to cyber threats requires new approaches to operational training and testing of countermeasures. Traditional assumptions about the security of space infrastructures-based on limited access and high technical barriers-are no longer valid in the face of accessible tools like Software Defined Radio (SDR) and cloud-based services such as Ground Station as a Service (GSaaS). In this paper, we present four realistic cyber attack scenarios specifically designed for integration into OpenSatRange (OSR), an open-source cyber range developed for training and experimentation in the satellite domain. The proposed scenarios cover key vulnerabilities in satellite ecosystems, including ground segment compromise, broadcast channel cryptographic flaws, inter-satellite link saturation (DDoS), and firmware-level hijacking via memory corruption. Each scenario is modeled with an emphasis on hands-on learning, narrative realism, and technical reproducibility. This work contributes to building a structured, operational framework for cybersecurity training in space systems, enabling simulation-based evaluation of both detection and response strategies in an environment that accurately reflects satellite communication constraints.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Satellite cybersecurity</kwd>
        <kwd>Cyber range</kwd>
        <kwd>Training scenarios</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Historically, the satellite domain has been considered relatively secure compared to other areas
of telecommunications, partly because of a security-by-obscurity1 approach and partly because
of the high infrastructure costs required to carry out attacks. The required equipment, such
as ground stations, high-powered transceivers, and specialized radio systems, presented a
technological and economic barrier that made it impractical for non-state actors or otherwise
not significantly resourced to compromise. As an illustration, the developers of the Iridium
network claimed that the system was “too complex to attack” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        This perception, however, is no longer valid in the current context. The satellite
communications ecosystem has evolved rapidly, with markedly lowered barriers to entry both economically
and technically. Services such as Ground Station as a Service (GSaaS), ofered by cloud providers
such as Amazon Web Services and Microsoft Azure, allow any user with minimal skills to send
and receive data from satellites, making the ground infrastructure a potential entry point for
cyber attacks. In parallel, open source and open hardware projects such as SatNOGS [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] enable
the construction of afordable amateur ground stations, further democratizing access to space.
In addition, the advent of technologies such as Software Defined Radio (SDR) has revolutionized
the threat landscape, allowing individuals to monitor, analyze, and interfere with satellite radio
signals using commercial hardware and open source software [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        ]. This lowering of technical
complexity has also made sophisticated attacks, such as spoofing, jamming, and injection of
malicious payloads into satellite firmware, more accessible [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">4, 3, 5</xref>
        ].
      </p>
      <p>
        In the face of a constantly evolving threat landscape, it is clear that the security of space
systems can no longer rely on passive measures or technological complexity alone. In fact,
today’s cyber threats surpass traditional defensive approaches based on isolation or obscurity of
technical specifications [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Instead, proactive and systematic approaches are needed, capable of
enabling a dynamic and resilient defense based on situational awareness, controlled
experimentation, and operational training. In particular, there is an emerging need for specific tools for
training, experimentation, and evaluation of countermeasures in realistic operational contexts,
such as cyber ranges, that enable the reproduction of concrete scenarios and evaluation of
defensive strategies in simulated environments [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        This is especially true in the satellite domain, where the coexistence of physical constraints
(latency, orbital mobility, limited visibility) and the complexity of on-board protocols impose
specialized skills and technologically advanced tools [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. However, while cyber ranges focused
on ground-based infrastructure are now widespread and established in academia and industry
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a flexible and accessible infrastructure for simulating attacks and defenses in the space
domain is still lacking.
      </p>
      <p>
        To fill this gap, the development of OpenSatRange (OSR) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], a cyber range specifically
designed to simulate satellite communication networks and enable hands-on exercises in realistic
scenarios, has been initiated. OSR aims to train operators, technicians and analysts in the
management of cyber incidents involving both terrestrial (ground stations, terminals) and
space (satellite constellations, edge protocols) segments through immersive and configurable
simulations. With this in mind, this paper proposes a set of four attack scenarios modeled
to be implemented in the OSR context. Each addresses a specific aspect of satellite system
vulnerabilities and represents a possible real-world threat. These scenarios are designed to
assess detection, response, and recovery capabilities, as well as provide an operational context
for the development of new countermeasures and defense policies.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <sec id="sec-2-1">
        <title>2.1. Real-World Satellite Attacks</title>
        <p>
          The security of satellite systems has historically been underestimated, mainly due to high
infrastructure costs and a security-by-obscurity approach. However, recent events show that
such systems are increasingly exposed to sophisticated and accessible threats. For example,
during the invasion of Ukraine in February 2022, a cyber attack compromised Viasat’s KA-SAT
satellite network, disrupting communication services for tens of thousands of users in Europe
and Ukraine [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ].
        </p>
        <p>
          Recent studies have highlighted the vulnerability of the firmware and software protocols used
aboard the satellites. In particular, the analysis conducted by Willbold et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] showed that real
systems sufer from serious weaknesses in terms of authentication, firmware integrity and access
protection. In parallel, targeted attacks on satellite services such as GNSS-for example, through
spoofing and jamming-are becoming increasingly common, partly due to the availability of
low-cost tools such as SDR (Software Defined Radio) [
          <xref ref-type="bibr" rid="ref3 ref5">3, 5</xref>
          ].
        </p>
        <p>
          Specifically, Giuliari et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] demonstrated that it is possible to conduct DDoS attacks against
low-orbit (LEO) constellations by saturating inter-satellite links, with the potential to
compromise communications across entire geographic areas. In addition, the public availability of
orbital data and technical parameters of satellites accentuates the attack surface and encourages
targeted malicious operations. In this regard, Manulis et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] present a comprehensive
analysis of threats in the New Space context, illustrating the evolution of attacks and entry
vectors in the space and ground segments.
        </p>
        <p>
          The security of satellite location services is also increasingly the focus of attention. GPS
spoofing and meaconing attacks have been documented in real-world scenarios, as in the case
of the RQ-170 drone captured in Iran [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], and recent studies confirm their ease of execution in
the presence of unauthenticated signals [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Cybersecurity Training in Sector-Specific Domain</title>
        <p>Training in cybersecurity has long moved beyond a generalist approach, evolving toward
specialized programs for vertical domains. This trend is particularly evident in sectors with
distinctive technical or operational characteristics, where threats take diferent forms than in
traditional IT contexts.</p>
        <p>
          In the industrial sector, for example, courses such as those ofered by CISA for ICS systems
[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] focus on operational aspects, minimal latencies, and legacy environments, while academic
initiatives such as KYPO4Industry provide hands-on environments for testing exploits in
realworld control networks [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Similarly, in the healthcare domain, institutes such as SANS ofer
pathways focused on ransomware attacks and patient data protection, with a focus on specific
regulations such as HIPAA [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          In aerospace and defense, the DoD Cyber Crime Center (DC3) ofers a suite of advanced
courses on critical infrastructure protection and forensic investigation in operations [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. There
are also centers dedicated to law enforcement training, such as UCD’s Center for Cybersecurity
&amp;amp; Cybercrime Investigation, which adapts OSINT and digital forensics techniques to
real-world investigative scenarios [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <p>These examples show how the declination of cyber training to diferent operational contexts
is a must. In this landscape, the spatial domain-with physical constraints, proprietary protocols</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Cyberranges for Satellite Security</title>
        <p>Unlike traditional cyber ranges focused on IT or ICS infrastructure, satellite cyberrange platforms
replicate the unique features of space operations, such as physical constraints, custom protocols,
and the interaction between ground and orbital segments.</p>
        <p>
          At the European level, the European Space Agency (ESA) has opened in Tallinn, Estonia, the
ifrst Space Cyber Range fully dedicated to simulating attack and defense scenarios against space
infrastructure. This initiative is designed to support exercises and resilience testing by public
and private entities in the European aerospace sector [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>In the U.S., NASA has built specific tools for the simulation of small satellites such as CubeSats.
In particular, the NOS3 (NASA Operational Simulator for Small Satellites) framework, developed
for the Simulation-to-Flight-1 (STF-1) mission, allows the entire software life cycle of the satellite
to be simulated in a virtual environment. This open-source tool is designed to support early
verification of on-board functionality and pre-flight risk reduction, providing a valuable resource
for pre-launch operational testing.</p>
        <p>Also in academia, initiatives such as the Unified Cybersecurity Testing Lab for Satellite,
Aerospace, Avionics, Maritime and Drone (SAAMD) have demonstrated the importance of
multi-domain environments for security assessment in the space domain [19].</p>
        <p>
          This landscape includes OpenSatRange (OSR), an open-source cyber range promoted by the
Italian Space Agency (ASI), developed to enable operational exercises, attack simulations, and
countermeasure testing in realistic satellite scenarios. OSR is distinguished by its modularity,
ability to integrate SDR segments, and focus on supporting LEO/GNSS and ground-segment
compromise scenarios [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Training Scenarios</title>
      <p>
        In this section, we present four scenarios that can be implemented within a satellite-focused
cyber range such as the one described in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Each scenario is designed to replicate realistic
cyber attack situations in the space domain, providing an operational context for training and
evaluation activities.
      </p>
      <p>Each scenario is described through the following three dimensions:
Story: We outline the environment, the narrative behind the attack, and the attacker’s objective.
This serves as the script guiding the actions that the attacker must perform to successfully
complete the training.</p>
      <p>Network: Given the satellite context, special attention is devoted to describing the network
topology, including both terrestrial and space segments.</p>
      <p>Relevance: For each scenario, we highlight its relevance by drawing parallels with real-world
cyber attacks that have occurred in the satellite sector.</p>
      <sec id="sec-3-1">
        <title>3.1. Scenario 1: Ground Segment Attack</title>
        <p>This scenario describes an hypotetical attack that involves the ground segment of a satellite
environment.</p>
        <p>Story: A big company is hosting an infrastructure of Ground Station as a Service (GaaS) which
is accessible through a web site always hosted by the company. Due to an intricate security flaw,
an external attacker is able to gain partial access to the machine hosting the service. Exploiting
his privileges, he can dump and patch the satellite firmware, that is later uploaded and installed
on a satellite through a periodical update procedure. In this way the ground station is used as
an attack vector to reach satellites in orbit.</p>
        <p>Network: The network infrastructure is summarized in figure 1 The space segment consists of
a LEO constellation with a (suficient) number of satellites in such a way that at least one of
them is in the ground station visibility range.</p>
        <p>
          Relevance: Numerous cyber attacks have targeted user devices or ground segments in satellite
communication systems. One of the most recent and widely known incidents is the attack
on Viasat’s KA-SAT network in February 2022 [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The attackers deployed a wiper malware
known as AcidRain, which was specifically designed to erase the flash memory of satellite
modems. Although the satellite itself and the core ground infrastructure were not compromised,
the attack rendered thousands of modems inoperable, significantly disrupting satellite internet
services across Europe and Ukraine. Another example is about the Russian satellite telecom
provider Dozor which was compromised in a cyberattack that resulted in damage to user
terminals and a temporary network outage. The attackers successfully infiltrated systems
responsible for managing customer equipment, highlighting critical vulnerabilities in satellite
ground infrastructures [20].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Scenario 2: Decrypting a broadcast channel</title>
        <p>This scenario focuses on the role of cryptography in securing satellite communications.
Story: This scenario aims to exploit a misconfiguration in a custom satellite key exchange
protocol to demonstrate how cryptographic vulnerabilities can be leveraged to compromise the
confidentiality of message exchanges. The attacker’s objective is to decrypt communications
transmitted over a satellite broadcast channel, revealing sensitive data that was assumed to be
securely encrypted. A central satellite periodically sends a message containing an encrypted
symmetric key in a broadcast channel. The message is formatted as follows:
• The RSA public key (in PEM format) used to cipher the symmetric key;
• The encrypted symmetric key.</p>
        <p>Each node that receives the message checks the public key to see if it matches its private key,
and if so, decrypts the symmetric key that will be used to encrypt the rest of the communication.
An external attacker is snifing the trafic over the broadcast channel and due to incorrect
configuration of pre-distributed RSA keys, he can perform an RSA common factor attack to
decrypt the message and thus obtain the symmetric encryption key.</p>
        <p>Network: The network infrastructure, illustrated in Figure 2, consists of a GEO satellite that
communicates over a broadcast channel with multiple user terminals.</p>
        <p>Relevance: Crypto attacks are also a real threat in the satellite environment as shown real-time
inversion attacks on the GMR-2 cipher used in satellite phones were reported [21].</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Scenario 3: Distributed Denial of Service in a LEO Constellation</title>
        <p>
          A Distributed Denial of Service (DDos) is a cyber attack, widely known in the
telecommunications sector, which uses a huge amount of dummy data trafic to saturate network links,
exploiting the limited bandwidth capacity. Typically, botnets are used to generate the
aforementioned trafic, that is, an attempt is made to infect a set of machines within a local network (for
example a corporate network) that has an access point to the target network, taking control
of them and transforming them into a set of bots at the service of an external user, through
software that can be traced back to the Command &amp; Control (C2) family [22].
Story: This scenario tried to reproduce the ICARUS attack [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] providing a vulnerable corporate
network isolated by a wrong-configured firewall and a broken gateway. Gaining access to one
machine on the network allows the attacker to quickly take control of others and set up a botnet,
which can be used to flood a huge amount of trafic on a satellite link with limited bandwidth.
The goal is to saturate the inter-satellite links thus leading to unavailability of the service.
Network: The network topology provided is summarized in figure 3. For technical reasons, we
need a test machine that pings two satellites and provides the attacker with the code to proceed
with the exercise when one of the two is no longer reachable.
        </p>
        <p>
          Relevance: Despite being largely known in standard telecommunications systems, DDOS
attacks have recently studied also in a satellite system (ICARUS Attack [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]).
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Scenario 4: Satellite Hijacking</title>
        <p>This attack targets a vulnerable implementation of a library used to parse telecommands.
Story: This scenario aims to show how simple it is to break a satellite system with an obscured
simple vulnerability. The provided network topology is shown in figure 4. The idea behind the
attack is the following: a satellite is piloted by firmware that makes use of vulnerable library
functions like strcpy that can be exploited by an attacker to perform a bufer overflow and
rewrite part of the satellite’s memory. The goal is to corrupt the satellite’s memory, causing it
to operate in a manner controlled by the attacker.</p>
        <p>In this scenario, we have a weather forecast satellite, which receives input requests on the
collected data, and an external attacker that carries out the attack by exploiting the
abovementioned vulnerability. To make everything more realistic, communication with the satellite
uses the CCSDS format [23].</p>
        <p>Network: Although we only need one satellite to set up the attack, the provided topology
allows for a suficient number of satellites to allow, with the parameters provided, that the
intervals of non-visibility (in which the attacker does not see any satellites) are very short, so
as to allow an efective exercise.</p>
        <p>
          Relevance: The concept of security through obscurity is prevalent in satellite systems, as the
ifrmware used is often proprietary and specifically developed for custom hardware architectures.
Although this is true, the Space Odyssey study [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] shows that attacks based on information
gathered through reverse engineering are feasible.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Implementation</title>
      <p>This section ofers a more in-depth technical perspective on the training scenarios outlined in
Section 3. All software implementation details are designed with the interactive nature of the
cyber range in mind. This means that each successfully exploited vulnerability must yield a flag
(namely unique code) that is provided to the user as proof of exploitation.</p>
      <sec id="sec-4-1">
        <title>4.1. Technical details about satellite software vulnerabilities: A hands-on approach</title>
        <p>4.1.1. Scenario 1
To emulate this attack, we need to:
if ((new_socket = accept(server_fd,
(struct sockaddr *)&amp;address, &amp;addr_len)) &lt; 0) {
close(server_fd);
exit(EXIT_FAILURE);</p>
        <p>Listing 1: C code snippet example for hackable firmware
1. Develop a vulnerable server hosting a Ground Station as a Service web page. In particular,
we want to hide a git repository used for platform deployment and maintenance behind a
hidden virtual host;
2. Set up the git repository with explanatory logs and a credentials file removed with the
last commit;
3. Set up a server on the Ground Station machine with an automated firmware update
routine and an easy-to-crack firmware executable.</p>
        <p>To emulate a firmware tampering in an emulated environment, while still delivering a valid
lfag to the user, we follow this approach: the provided firmware includes a "secret" code
segment, that is, a theoretically unreachable portion of code, which becomes executable through
a firmware patch (e.g., modifying an immediate value in a loop condition). This hidden code is
responsible for triggering the flag. Consequently, the satellite environment can be kept simple,
requiring only a flag.txt file and a lightweight server that reads the input bytes, builds an
executable, and runs it. As an illustrative example, refer to the code snippet shown in 1, which
contains a hidden code segment accessible only under a specific condition. This condition can
be easily bypassed through binary tampering, allowing the execution flow to be redirected to
unauthorized code.</p>
        <p>Attacker walkthrough: From the attacker’s perspective, the intended approach for this
exercise is the following. Using enumeration tools like Gobuster, the attacker first identifies the
presence of the virtual host, then iterates the process to locate the git repository. Once found,
the attacker can clone the repository to their machine using tools like GitDumper. By leveraging
Git’s features and analyzing commit messages in the log, they can locate the file containing the
credentials and restore it. With the credentials, the attacker can gain SSH access to the machine.
After enumerating the files and active cron jobs, they can identify the firmware to patch. Using</p>
        <p>Listing 2: A possible way to implement a gateway for MIME type inspection
reverse engineering tools like Ghidra and binary patching tools like Okteta, they can apply the
necessary changes to compromise the satellite.
4.1.2. Scenario 2
The goal of this Scenario is to violate the confidentiality of satellite transmissions by obtaining
symmetric encryption keys by intercepting key-distribution messages sent from a satellite
acting as a master-key server.</p>
        <p>To implement this, we must pre-distribute the private keys across the various nodes, ensuring
that two nodes share a common prime factor in the RSA key, denoted as N. This setup allows
the attacker to intercept network trafic using tools like Wireshark and launch a common factor
attack, leveraging the public key present in the messages as outlined in 3.2.</p>
        <p>Attacker walkthrough: Using snifing tools, the attacker must gather a large set of public
keysymmetric key pairs. Then, a cryptographic attack can be performed, for example, leveraging
the capabilities of the Python library PyCryptoDome. If successful, the private keys obtained can
be used to decrypt the corresponding symmetric keys, which, for the purpose of the exercise,
will contain the flag.
4.1.3. Scenario 3
In this scenario we want to emulate the well-known ICARUS attack. To do that we have to:
1. Model a corporate network hosting a web service with the capability to upload images;
2. Put a firewall and a gateway to protect the network. The firewall checks TCP connection
requests, denying incoming connections on port 4242, which is used by machines on the
network to host a custom remote shell service. This can be implemented more simply
by leveraging iptables rules such as iptables -A INPUT -p tcp –dport 4242
! -s 192.168.1.0/24 -j DROP, assuming that 192.168.1.0/24 is the network
mask of the LAN. The gateway on the other hand performs checks on post requests to
the website, verifying that the MIME type actually corresponds to an image, applying
checks like the one reported in listing 2;
3. Implement a custom remote shell service that includes a basic and commonly encountered
vulnerability—such as an SQL injection in the access control system or a similar low-level
lfaw. The specific nature of the vulnerability is left to the discretion of the reader, as it
does not influence the overall success of the attack scenario.</p>
        <p>The success of the attack hinges on accurately modeling an intersatellite link with suficiently
low network bandwidth.</p>
        <p>Attacker walkthrough: The attacker’s first step is to detect the presence of the web service
using Nmap. The firewall will mask port 4242 as filtered. Upon accessing the web service, the
attacker discovers the file upload feature, which can be exploited by uploading a PHP file and
subsequently viewing it via the "view image" button. After some testing, the attacker identifies
the presence of a gateway and bypasses it by using a Burp proxy server to intercept requests
and modify the MIME type, circumventing the gateway’s soft checks. At this point, the attacker
can set up a local file inclusion (LFI) attack, causing the web server to execute the uploaded PHP
page, which can contain code for a remote shell. Once inside the network, the attacker exploits
the vulnerable custom service to move between machines and install the botnet. To create the
botnet, the attacker develops both a server for remote control and a client that sends packets
when triggered via a designated link. To make the attack feasible, the user will be provided with
information about the vulnerable satellite link using the facilities provided by the cyber range.
4.1.4. Scenario 4
In this scenario we chose to implement the vulnerable server in C to gain greater control over
memory layout and object placement within the address space. This also required developing a
custom C library to handle the CCSDS packet protocol. The core idea is to define a packet data
structure without any padding between its members, making the exploit more straightforward
to execute. By leveraging a vulnerable function such as strcpy, an attacker can overwrite a
structure member located immediately after the bufer used to store the message. A software
routine then inspects this overwritten field and, if it has been correctly manipulated, the program
ceases normal operation and begins responding with the flag.</p>
        <p>Attacker walkthrough: The exercise includes the executable file that implements the
vulnerable server-side service. The attacker must use reverse engineering tools like Ghidra to analyze
the binary and identify the described vulnerability. Once understood, the attacker can self-host
the service to perform tests and determine the appropriate payload to exploit the vulnerability.
To carry out the attack, the attacker needs to implement a client that, using the provided C
library for generating CCSDS packets, sends the correct payload to the server, triggering a
memory corruption that ultimately results in the flag being distributed, as previously explained.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The increasing exposure of satellite systems to cyber threats is a priority challenge for space
infrastructure security, both civil and military. In a context where accessibility to space is
expanding through the use of COTS technologies, cloud-based services such as GSaaS, and tools
such as SDRs, the space domain can no longer be considered an inaccessible environment.</p>
      <p>This paper presents four didactic attack scenarios designed to be integrated within a cyber
range such as OpenSatRange. The scenarios are inspired by real cases documented in the
literature and incident reports, and cover a wide range of attack vectors: firmware compromise,
cryptographic exploits, inter-satellite DDoS, and advanced spoofing on broadcast services. The
goal is to provide operational and narrative tools that allow operators to practice in controlled
but reality-adherent environments.</p>
      <p>Defining these scenarios is a first step toward building a framework for practical training
and evaluation of countermeasures in the space environment. The narrative-technical approach
adopted allows enhancing both the educational aspect and reproducibility in simulated
environments. In addition, their future integration into OSR will allow not only training operators, but
also testing defensive solutions and monitoring tools under realistic conditions.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used X-GPT-4 in order to: Grammar and
spelling check. After using these tool, the authors reviewed and edited the content as needed
and take full responsibility for the publication’s content.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This research is supported by the project “OpenSatRange: Un cyber range aperto per la
formazione in cyber security di operatori di sistemi e reti satellitari” supervised and financed by
the Italian Space Agency (Agenzia Spaziale Italiana, ASI) in the framework of the Research Day
“Giornate della Ricerca Spaziale” initiative through the contract no. ASI-2023-2-U.0, and by the
CYBER4SPACE project, funded by the 2024 Scientific Research Grant of the University of Rome
Tor Vergata.
accessed April 11, 2025.
[19] A. Costin, H. Turtiainen, S. Khandker, T. Hämäläinen, Towards a unified cybersecurity
testing lab for satellite, aerospace, avionics, maritime, drone (saamd) technologies and
communications, arXiv preprint arXiv:2302.08359 (2023). URL: https://arxiv.org/abs/2302.
08359.
[20] V. Petkauskas, Russian satellite telecom dozor hit by hackers, 2023. URL: https://cybernews.</p>
      <p>com/cyber-war/dozor-russian-satellite-telecom-hacked/, accessed: 2025-04-11.
[21] J. Hu, R. Li, C. Tang, A real-time inversion attack on the gmr-2 cipher used in the satellite
phones, Science China Information Sciences 61 (2018) 1–18.
[22] H. R. Zeidanloo, A. A. Manaf, Botnet command and control mechanisms, in: 2009 Second
International Conference on Computer and Electrical Engineering, volume 1, IEEE, 2009,
pp. 564–568.
[23] The Consultative Committee for Space Data Systems, CCSDS publications manual, 2014.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Falco</surname>
          </string-name>
          ,
          <article-title>The Vacuum of Space Cyber Security, in: AIAA SPACE and Astronautics Forum</article-title>
          and Exposition, American Institute of Aeronautics and Astronautics,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Satnogs</surname>
          </string-name>
          :
          <article-title>Satellite networked open ground station</article-title>
          , https://satnogs.org/, ???? Accessed:
          <fpage>2025</fpage>
          -04-11.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Giuliari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ciussani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perrig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singla</surname>
          </string-name>
          ,
          <article-title>ICARUS: Attacking Low Earth Orbit Satellite Networks</article-title>
          ,
          <source>in: 2021 USENIX Annual Technical Conference (USENIX ATC 21)</source>
          , USENIX Association,
          <year>2021</year>
          , pp.
          <fpage>317</fpage>
          -
          <lpage>331</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Willbold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schloegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vögele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gerhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Holz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abbasi</surname>
          </string-name>
          , Space Odyssey:
          <article-title>An Experimental Software Security Analysis of Satellites, in: 2023 IEEE Symposium on Security and Privacy (SP)</article-title>
          , IEEE, San Francisco, CA, USA,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . doi:
          <volume>10</volume>
          .1109/ SP46215.
          <year>2023</year>
          .
          <volume>10351029</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liang</surname>
          </string-name>
          , R. Liu,
          <article-title>Spoofing and anti-spoofing technologies of global navigation satellite system: A survey</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>165444</fpage>
          -
          <lpage>165496</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3022149</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Falco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Boschetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Security</given-names>
            <surname>Risk</surname>
          </string-name>
          <article-title>Taxonomy for Commercial Space Missions</article-title>
          , in: ASCEND, American Institute of Aeronautics and Astronautics,
          <year>2021</year>
          , p.
          <fpage>4241</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bernardinetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Iafrate</surname>
          </string-name>
          , G. Bianchi,
          <article-title>Nautilus: A Tool for Automated Deployment and Sharing of Cyber Range Scenarios</article-title>
          ,
          <source>in: Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES)</source>
          , ACM,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1145/3465481. 3469206.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Vykopal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ošlejšek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Čeleda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vizváry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tovarňák</surname>
          </string-name>
          , KYPO Cyber Range: Design and
          <string-name>
            <given-names>Use</given-names>
            <surname>Cases</surname>
          </string-name>
          ,
          <source>IEEE Transactions on Education (preprint)</source>
          (
          <year>2017</year>
          ). Available from Masaryk University technical report or conference proceedings; see also https://crp.kypo.muni.cz.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Patrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Loreti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fiscariello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Bracciale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Amici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Detti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Roseti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zampognaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Luglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          , et al.,
          <article-title>Opensatrange: An open cyber range for operators and users of satellite communication networks</article-title>
          ,
          <source>in: CEUR WORKSHOP PROCEEDINGS</source>
          , volume
          <volume>3731</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>CyberPeace</given-names>
            <surname>Institute</surname>
          </string-name>
          ,
          <article-title>Viasat cyberattack case study</article-title>
          , https://cyberconflicts. cyberpeaceinstitute.org/law-and-policy/cases/viasat,
          <year>2022</year>
          . Accessed:
          <fpage>2025</fpage>
          -04-11.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>A survey on satellite communication system security</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <year>2024</year>
          )
          <article-title>2897</article-title>
          . URL: https://www.mdpi.com/1424-8220/24/9/2897. doi:
          <volume>10</volume>
          .3390/s24092897.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Manulis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. P.</given-names>
            <surname>Bridges</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Harrison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sekar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <article-title>Cyber security in new space: Analysis of threats, key enabling technologies and challenges</article-title>
          ,
          <source>International Journal of Information Security</source>
          <volume>20</volume>
          (
          <year>2021</year>
          )
          <fpage>287</fpage>
          -
          <lpage>311</lpage>
          . URL: https://doi.org/10.1007/s10207-020-00503-w. doi:
          <volume>10</volume>
          .1007/s10207-020-00503-w.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>Cybersecurity and Infrastructure Security Agency (CISA), Ics training available through cisa</article-title>
          ,
          <year>2025</year>
          . URL: https://www.cisa.gov/resources-tools/programs/ ics-training-available-through-cisa,
          <source>accessed April 11</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Čeleda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vykopal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Švábenský</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Slavíček</surname>
          </string-name>
          ,
          <article-title>Kypo4industry: A testbed for teaching cybersecurity of industrial control systems</article-title>
          ,
          <source>in: Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1234</fpage>
          -
          <lpage>1240</lpage>
          . URL: https: //doi.org/10.1145/3328778.3366908. doi:
          <volume>10</volume>
          .1145/3328778.3366908.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>SANS</given-names>
            <surname>Institute</surname>
          </string-name>
          , Cybersecurity courses &amp; certifications,
          <year>2025</year>
          . URL: https://www.sans.org/ cyber-security-courses/,
          <source>accessed April 11</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <article-title>Department of Defense Cyber Crime Center (DC3), Cyber training academy</article-title>
          ,
          <year>2025</year>
          . URL: https://www.dc3.mil/TrainingAcademy, accessed April 11,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17] University College Dublin,
          <article-title>Centre for cybersecurity &amp; cybercrime investigation (cci</article-title>
          ),
          <year>2025</year>
          . URL: https://www.ucd.ie/cci/,
          <source>accessed April 11</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>European</given-names>
            <surname>Space</surname>
          </string-name>
          <article-title>Agency (ESA), Estonia to host europe's new space cybersecurity testing ground</article-title>
          ,
          <year>2025</year>
          . URL: https://www.esa.int/Applications/Connectivity_and_Secure_ Communications/Estonia_to_host_
          <article-title>Europe_s_new_space_cybersecurity_testing_ground,</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>