Challenge: GPS Spoofing
Overview
Global Positioning System (GPS) technology is critical for maritime navigation, but it is also vulnerable to cyber threats such as GPS spoofing and Man-in-the-Middle (MITM) attacks. These attacks can manipulate location data, mislead ships, and create significant security risks.In this lab, you will analyze network traffic to uncover a GPS spoofing attack. Your task is to extract the real coordinates, the modified coordinates, determine the IP address of the adversary and the protocol he has used. Through hands-on tasks, you will develop the skills to recognize a GPS-based spoofing cyber threat.
Objectives
- Analyze GPS Network Traffic – Inspect a .pcap file to identify anomalies in GPS transmissions.
- Extract Key Information – Retrieve the original and manipulated coordinates to understand the impact of the attack.
- Identify the Attacker – Determine the IP address of the entity responsible for the GPS spoofing.
- Analyze the protocol used for GPS communication
- Conclude whether this was A MITM attack based on the evidence
Instructions
- Read carefully the provided materials on resources section.
- Read this guide to connect to the remote lab
- Complete the interactive task to practice identifying a MITM attack.
Resources
Outcome
By completing this challenge, you will gain practical experience in analyzing network traffic for GPS manipulation, and identifying if a Man in the Middle attack occurs.