{"id":394,"date":"2020-05-18T21:47:56","date_gmt":"2020-05-18T19:47:56","guid":{"rendered":"https:\/\/www.spacesecurity.info\/?p=394"},"modified":"2020-05-18T21:47:56","modified_gmt":"2020-05-18T19:47:56","slug":"first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/","title":{"rendered":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit"},"content":{"rendered":"<figure id=\"attachment_13\" aria-describedby=\"caption-attachment-13\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1.jpg\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1-300x200.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1-768x512.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/ISS-48_SpaceX_CRS-9_arrives_at_the_ISS_1-696x464.jpg 696w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption id=\"caption-attachment-13\" class=\"wp-caption-text\">SpaceX Dragon capsule during its approach to the ISS (Photo credits: NASA)<\/figcaption><\/figure>\n<p>It was the <a href=\"https:\/\/techcrunch.com\/2020\/04\/22\/air-force-hack-satellite\/\">TechCrunch<\/a> site that revealed the information. The U.S. Air Force will launch a bug bounty program in the form of a CTF (Capture The Flag) whose goal is to hack a real satellite in orbit above the Earth.<\/p>\n<p>Last year, at the famous <a href=\"https:\/\/www.defcon.org\/\">Defcon<\/a> cyber security conference, the US Air Force had already asked hackers to hack one of their F-15 fighter planes. And they succeeded! The results, which were not made public, proved to be very interesting according to the organisers.<\/p>\n<p>It was the first time that hackers were allowed to penetrate US Air Force systems and physically access the F-15 system to look for vulnerabilities.<\/p>\n<p>The <a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2019\/08\/14\/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet\/5d53111988e0fa79e5481f68\/\">Washington Post<\/a> revealed that in just two days, a team of seven hackers managed to discover several critical vulnerabilities that, if exploited in the real world, could have crippled the aircraft&#8217;s systems, causing potentially very serious damage.<\/p>\n<figure id=\"attachment_16\" aria-describedby=\"caption-attachment-16\" style=\"width: 1151px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf.jpg\" alt=\"\" width=\"1151\" height=\"768\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf.jpg 1151w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf-300x200.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf-1024x683.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf-768x512.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf-696x464.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/160604-axe-figther-planes-tease_uqcjpf-1068x713.jpg 1068w\" sizes=\"auto, (max-width: 1151px) 100vw, 1151px\" \/><\/a><figcaption id=\"caption-attachment-16\" class=\"wp-caption-text\">U.S. Air Force F-15E Strike Eagle (photo cr\u00e9dits : U.S. Air Force &#8211; Senior Airman Erin Trowe)<\/figcaption><\/figure>\n<p>Will Roper, Assistant Secretary of the US Air Force, said at the time: &#8220;I left this event thinking that there was a huge national asset in this level of cyber expertise that the US Air Force is sorely lacking&#8221;.<\/p>\n<p>Indeed, for years, the US Air Force has historically kept the security of its systems and technology in absolute secrecy, fearing espionage or sabotage by the enemy. &#8220;It was like being stuck in the business practices of the Cold War. But in today&#8217;s world, this is not the best security posture,&#8221; Roper said.<\/p>\n<p>Following the success of this first initiative, the US Air Force decided to repeat the experience and call again on security researchers at the <a href=\"https:\/\/aviationvillage.org\/\">Aerospace Village<\/a> of the 2020 <a href=\"https:\/\/www.defcon.org\/html\/defcon-28\/dc-28-index.html\">Defcon28<\/a>. This time it will involve hacking into a real satellite in orbit, hovering miles above the earth&#8217;s surface.<\/p>\n<figure id=\"attachment_24\" aria-describedby=\"caption-attachment-24\" style=\"width: 1602px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-24 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat.jpg\" alt=\"\" width=\"1602\" height=\"694\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat.jpg 1602w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-300x130.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-1024x444.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-768x333.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-1536x665.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-696x302.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/aerospace-village-defcon-28-hack-a-sat-1068x463.jpg 1068w\" sizes=\"auto, (max-width: 1602px) 100vw, 1602px\" \/><\/a><figcaption id=\"caption-attachment-24\" class=\"wp-caption-text\">Cr\u00e9dits : hachasat.com<\/figcaption><\/figure>\n<p>Will Roper reminds us that satellites, even if they are far from earth, face real threats. Among these, he cites the possibility of using &#8220;anti-satellite&#8221; weapons to jam, blind or even prevent devices from communicating with their base stations.<\/p>\n<p>It is not only the satellites in orbit that are threatened.\u00a0Earth stations and communication links between earth and sky could be as vulnerable as the satellites themselves, Roper said.<\/p>\n<p>This year&#8217;s program is called &#8220;<a href=\"https:\/\/www.hackasat.com\/\">Hack-A-Sat<\/a>&#8220;, a space security program that involves attacking an actual satellite in orbit and spotting bugs and vulnerabilities that could be exploited by the enemy.<\/p>\n<h2>Teaser vid\u00e9o<\/h2>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/ZShyj_Uiyzo\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>This is a paradigm shift for the US Air Force, which until now has been used to building closed and locked systems. By moving to semi-open systems, it opens up &#8220;satellite&#8221; technology to the wider community, while reserving the highest ranked technology for its in-house experts and engineers.<\/p>\n<p>The aim of this initiative is not only to fix existing bugs but also to consolidate the supply chain to prevent the introduction of new bugs,&#8221; adds Will Roper.<\/p>\n<h2>How to register?<\/h2>\n<p>The rules of participation in &#8220;Hack-A-Sat&#8221; have been published in detail on the <a href=\"https:\/\/www.hackasat.com\/rules-here\">hackasat.com<\/a> website (see <a href=\"https:\/\/www.hackasat.com\/rules-here\">PDF<\/a>). The <a href=\"https:\/\/quals.2020.hackasat.com\/\">registration form<\/a> has been online since April 22nd.<\/p>\n<h2>Qualifying events<\/h2>\n<p>The first step is to take part in the qualifying events which will be held online from 22 May. Candidates will have to take up several challenges by hacking a test satellite in the form of a kit and solve as many challenges as possible in 48 hours. The end of the qualification tests is scheduled for 24 May.<\/p>\n<p>The goal of the qualifying rounds is to identify the best and keep only the &#8220;cream of the crop,&#8221; as Will Roper explains.<\/p>\n<figure id=\"attachment_29\" aria-describedby=\"caption-attachment-29\" style=\"width: 1020px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster.jpg\" alt=\"\" width=\"1020\" height=\"747\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster.jpg 1020w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster-300x220.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster-768x562.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-poster-696x510.jpg 696w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><\/a><figcaption id=\"caption-attachment-29\" class=\"wp-caption-text\">Cr\u00e9dits : hachasat.com<\/figcaption><\/figure>\n<h2>What is the final event?<\/h2>\n<p>Only the top 10 teams will qualify for the final event at the Defcon 2020 conference in Las Vegas in August. The challenge of the final event has been revealed. Besides the fact that the hackers will have to attack a real satellite, they will also have to try to hack its camera and take a picture of the Moon as proof (the famous &#8220;flag&#8221;). The first three teams will receive prizes ranging from $20,000 to $50,000.<\/p>\n<p>With the current Coronavirus Pandemic continuing, the organizers could hold the final event remotely. In addition to hoping that hackers will find vulnerabilities, the event also aims to raise awareness at the highest level within the US Air Force and change the way they think about security.<\/p>\n<p>Will Roper hopes that in the future, the US Air Force will think about working differently, using the hacker community more often when designing a satellite. &#8220;If this future generation becomes a reality, then we&#8217;ll be in a much better cyber position. \u00bb<\/p>\n<h2>For more information<\/h2>\n<p>For those who are interested and want to know more about the &#8220;Hack-A-Sat&#8221; program, the organizers have written a <a href=\"https:\/\/www.hackasat.com\/faqs\">FAQ<\/a>.<\/p>\n<h2>Resources<\/h2>\n<figure id=\"attachment_28\" aria-describedby=\"caption-attachment-28\" style=\"width: 366px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-28 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-logo.jpg\" alt=\"\" width=\"366\" height=\"304\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-logo.jpg 366w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-logo-300x249.jpg 300w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/a><figcaption id=\"caption-attachment-28\" class=\"wp-caption-text\">Cr\u00e9dits : hachasat.com<\/figcaption><\/figure>\n<ul>\n<li><strong>Hack-A-Sat<\/strong>\u00a0: <a href=\"https:\/\/www.hackasat.com\">https:\/\/www.hackasat.com<\/a><\/li>\n<li><strong>Defcon Website <\/strong>\u00a0: <a href=\"https:\/\/www.defcon.org\">https:\/\/www.defcon.org<\/a><\/li>\n<li><strong>Aerospace Village Website<\/strong>\u00a0: <a href=\"https:\/\/aviationvillage.org\/\">https:\/\/aviationvillage.org\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>It was the TechCrunch site that revealed the information. The U.S. Air Force will launch a bug bounty program in the form of a CTF (Capture The Flag) whose goal is to hack a real satellite in orbit above the Earth. Last year, at the famous Defcon cyber security conference, the US Air Force had [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":402,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,20,28,19],"tags":[],"class_list":{"0":"post-394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-en","8":"category-news","9":"category-satellite-en","10":"category-united-states"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"It was the TechCrunch site that revealed the information. The U.S. Air Force will launch a bug bounty program in the form of a CTF (Capture The Flag) whose goal is to hack a real satellite in orbit above the Earth. Last year, at the famous Defcon cyber security conference, the US Air Force had [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T19:47:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1079\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit\",\"datePublished\":\"2020-05-18T19:47:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/\"},\"wordCount\":895,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hack-a-sat-5.jpg\",\"articleSection\":[\"Hacking\",\"News\",\"Satellite\",\"United-States\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/\",\"name\":\"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hack-a-sat-5.jpg\",\"datePublished\":\"2020-05-18T19:47:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hack-a-sat-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hack-a-sat-5.jpg\",\"width\":1079,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/","og_locale":"en_US","og_type":"article","og_title":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info","og_description":"It was the TechCrunch site that revealed the information. The U.S. Air Force will launch a bug bounty program in the form of a CTF (Capture The Flag) whose goal is to hack a real satellite in orbit above the Earth. Last year, at the famous Defcon cyber security conference, the US Air Force had [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2020-05-18T19:47:56+00:00","og_image":[{"width":1079,"height":720,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit","datePublished":"2020-05-18T19:47:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/"},"wordCount":895,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg","articleSection":["Hacking","News","Satellite","United-States"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/","url":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/","name":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg","datePublished":"2020-05-18T19:47:56+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/04\/hack-a-sat-5.jpg","width":1079,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/first-ctf-in-space-with-hack-a-sat-the-us-air-force-launches-a-bug-bounty-and-invites-hackers-to-hack-one-of-their-satellites-in-orbit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"First CTF in space with Hack-A-Sat: the US Air Force launches a Bug Bounty and invites hackers to hack one of their satellites in orbit"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":2,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":403,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/394\/revisions\/403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/402"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}