Increasing Cyber Security at SEA through digital training

Challenge: GPS Spoofing

Overview

Global Positioning System (GPS) technology is critical for maritime navigation, but it is also vulnerable to cyber threats such as GPS spoofing and Man-in-the-Middle (MITM) attacks. These attacks can manipulate location data, mislead ships, and create significant security risks.In this lab, you will analyze network traffic to uncover a GPS spoofing attack. Your task is to extract the real coordinates, the modified coordinates, determine the IP address of the adversary and the protocol he has used. Through hands-on tasks, you will develop the skills to recognize a GPS-based spoofing cyber threat.

Objectives

 
  • Analyze GPS Network Traffic – Inspect a .pcap file to identify anomalies in GPS transmissions.
  • Extract Key Information – Retrieve the original and manipulated coordinates to understand the impact of the attack.
  • Identify the Attacker – Determine the IP address of the entity responsible for the GPS spoofing.
  • Analyze the protocol used for GPS communication
  • Conclude whether this was A MITM attack based on the evidence
    •  

Instructions

  1. Read carefully the provided materials on resources section.
  2. Read this guide to connect to the remote lab
  3. Complete the interactive task to practice identifying a MITM attack.

Outcome

By completing this challenge, you will gain practical experience in analyzing network traffic for GPS manipulation, and identifying if a Man in the Middle attack occurs.

Press the button to book the challenge with the credentials as in Moodle.



Book