Challenge: GPS Spoofing
Overview
Global Positioning System (GPS) technology is critical for maritime navigation, but it is also vulnerable to cyber threats such as GPS spoofing and Man-in-the-Middle (MITM) attacks. These attacks can manipulate location data, mislead ships, and create significant security risks.In this lab, you will analyze network traffic to uncover a GPS spoofing attack. Your task is to extract the real coordinates, the modified coordinates, determine the IP address of the adversary and the protocol he has used. Through hands-on tasks, you will develop the skills to recognize a GPS-based spoofing cyber threat.
Objectives
- Analyze GPS Network Traffic – Inspect a .pcap file to identify anomalies in GPS transmissions.
 - Extract Key Information – Retrieve the original and manipulated coordinates to understand the impact of the attack.
 - Identify the Attacker – Determine the IP address of the entity responsible for the GPS spoofing.
 - Analyze the protocol used for GPS communication
 - Conclude whether this was A MITM attack based on the evidence
 
Instructions
- Read carefully the provided materials on resources section.
 - Read this guide to connect to the remote lab
 - Complete the interactive task to practice identifying a MITM attack.
 
Resources
Outcome
By completing this challenge, you will gain practical experience in analyzing network traffic for GPS manipulation, and identifying if a Man in the Middle attack occurs.
