手可摘棉花

SpaceX Starlink user terminal modification

 
Overview
Author Lennert Wouters demonstrated how to execute arbitrary code on Starlink user terminals via a custom modchip injected with voltage faults, and notified Starlink of these vulnerabilities. Although the details are open source, the author does not sell the finished product, nor does he provide details of the modified endpoint firmware and fault injection used in the attack. The transformation is to use a Raspberry Pi microcontroller
参考设计图片
×
Design Files
 
Related Devices
Devices Class introduce Datasheet
RP2040 The embedded processor and controller RP2040 Microcontroller Download
 
Search Datasheet?

Supported by EEWorld Datasheet

Forum More
Update:2024-11-22 11:55:48

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号