← All talks

Hacking VSAT Terminals: 2014 Black Hat Talk Revealed #shorts

BSides Frankfurt1:16484 viewsPublished 2026-04Watch on YouTube ↗
About this talk
In 2014, IOActive exposed major vulnerabilities in vSAT terminals—used worldwide, from backyards to warships. Weak passwords, hardcoded credentials, and insecure protocols were rampant. Four years later, a follow-up revealed they could geolocate military devices. #vSAT #Cybersecurity #IOActive #Hacking #vulnerability
Show transcript [en]

Just an example for to to to show a bit like because it was a pretty public case. Um so in 2014, there was a a Black Hat talk from from IOActive on uh VSAT terminals. So these are end-user terminals that are deployed everywhere around the world. Like you can get one in your backyard or you can install one on your warship and you have internet access. Um and they they just got access to a lot of these terminals and tried to find some some vulnerabilities and there was everything like uh weak passwords, hard-coded credentials, insecure protocols, undocumented protocols. You name it. Um so yeah, the the hope was that something would change. Uh unfortunately, 4 years later, they did

another talk uh going into the technical details of the weaknesses in the protocols because previously they just said, "Okay, weak protocol." And then people said like, "Yeah." We we we cannot really do something about it. Um so they followed up. Uh next report came out where they showed that they can actually geolocate some of the devices which are deployed in a military context. Um which is pretty bad.