rone
New Member
- Joined
- Dec 23, 2016
- Messages
- 951
- Likes
- 3,108
Assume like this instead of poison a radar return you can poison a wireless link they operate once you can join this network or hijack it you can discover all systems connected on it by the current progress in commercial technology most of military computers still use commercial based operating system even they are hardened to military standards these military computers still run commercial OS so exploiting remote vulnerability ( 0 day) any attack vector can propagate through network and found end goal as normal cyber attack,BTW, do you have any resource that details how EW-CNA works? I mean the enemy is basically receiving your ECM as a signal on its radar, right? How do you get past all the signal processing circuitry and transmit a malacious code into the software of the IADS itself? At most the radar will provide speed, bearing, distance and radar signature of the target, right? And no matter what you do with your ECM signal, any info you transmit will end up as these parameters to the radar, right? So how can it make the jump from being a blob on the radar screen into actually affecting the IADS software itself?
In another scenario consider a network with no wireless data communications network and communications done by military garde optical fiber network, in this case direct wireless attack won't work but the sensor systems like radar with IFF can be exploited ( my pure imagination for theory crafting) IFF return with poisoned response received at IFF sensor which will my cause input data overflow ( buffer overflow) which trigger an code execution on IFF side and what ever output will be send back in IFF probe request so effectively you can build a communications through IFF sensor ( this is just a imagination to explain a possibility of CNA on non wireless network) i choose IFF because rather than rdar it is the only sensor system request and receive a digital data stream,