SlideShare a Scribd company logo
1 of 69
Allepey, Kerala [ India ]
Hacking your Cable TV Network
TV & Media
Today, we will Hack…
• Analogue Cable TV
• DVB-C
• DVB-T [Satellite TV]
• IPTV Intro
Rahul Sasi
• Security Engineer
• Speaker.
HITB [KL], BlackHat [US Arsenal], Cocon (2011, 2012, 2013), Nullcon (2011,
2012, 2013), HITB (AMS 2012), BlackHat (EU 2012), EKoparty (Argentina),
CanSecwest(Canada 2013), HITcon(Taiwan)
• One of the Admin members Garage4Hackers.com
• https://twitter.com/fb1h2s
Garage4Hackers.com
Agenda
• Analog Cable Networks.
 Architecture
 Introduction and Attacks
• Digital Cable Networks .
 Migration form Analog to Digital
 Digital Network architecture
 Application and Network layer bugs
Analog Cable Network The Basics
• FM Modulation And
Broadcasting [TV Station]
• Antenna Farm [ Cable
Operator End]
• IRD-Integrated Receiver
Decoders.
• Local cable network.
• TV
Analog Cable Network
Home TV
Local Cable TV
Operator
Decoder
Unit QAM Signal
Amplifier
Optical Fiber
Coaxial Cables
Antenna Farms
IRD Decoder
National Channel
One IRD per Channel
Modulator to QAM
QAM: Quadrature amplitude modulation
• Analog + Digital Modulation
• Modulates the amplitudes of analog waves, using AM
• Modulates the amplitudes of digital waves, using ASK
• Modulated waves are summed
• Amplified and distributed via optic fiber
Source: http://en.wikipedia.org/wiki/Quadrature_amplitude_modulation
QAM Device
The transmission channel is Unencrypted
Cable Operation
• Each channel received would be under a particular frequency.
• Cable Operators could modulate to any frequency.
• FDMA is used to sent all the different channels to users.
• The transmission medium is Radio over Fiber.
• TV channels tunes in individual frequency and decodes them to audio
and video.
Attacking Analog Network
Home TV
Local Cable TV
Operator
Decoder
Unit QAM Signal
Amplifier
Optical Fiber
Coaxial Cables
MITM
MITM:~ Local Cable Operator$
• Easy MITM: No Encryption in Analog Network
• Physical access = Free cable connection.
Or
• You can even Broadcast your own signals.
DTK: Our MITM unit Operator end:~ Devices used
• Optical
Receiver
• Optical to
Coaxial
• RF modulator
• Amplifier
• Signal Tap
Total: 80 usd
Our Garage
Local cable operator
• Fiber optic is fast and reliable but expensive.
• Doing a Man-In-Middle on Fiber optic is expensive
[atleast for us].
• Local cable admins convert optic input to co-axial.
• Coaxial cable could be easily tapped.
Optical Receiver:~
Device:~ optical to coaxial
Coaxial out
Optic IN
MITM:~ Tap and inject signals
The Process:~ For example
• BBC news would be in frequency A and Fox news on frequency
B.
• Both these frequency signals are sent over coaxial cable.
• TV knows how to decode each frequencies.
• So channel no 1 would be pre-set to display BBC [Frequency A]
and channel no 2 would be set to display “FOX NEWS ”
[Frequency B].
• As a hacker if I need to replace channels, one possibility is to
do a man in the middle attack and modulate my videos with
Star Movies frequency.
MITM demo
• Video removed
Avoiding Collision
• Let us shut down the original signal source.
• Shutting down the entire signal source will stop all the
channels.
• Signal cutter to the rescue – Block FOX news Only.
• Introduce our Video in Fox news Frequency
Demo
• Video removed visit
garage4hackers.com/blog.php?u=8
Digital TV Introduction
• In December 2011, the Lok Sabha passed Cable Television
Networks (Regulation) Amendment Bill.
• In the Act the addressable system may only transmit
encrypted signals.
• So with this Act it is mandatory to install set-top boxes on
every house for decoding the transmitted signals.
Digital TV Introduction
• Cable TV & Customers Upgrade to DVBC or IP network which
can now transmit encrypted signals.
• DVBC standard [Conditional Access] is an access control
mechanism.
• IPTV Networks are traditional TCP/IP Stack.
• Now Signals are encrypted or scrambled before sent on
wire.
• A set-top box device is needed to de-scramble the output
• STB decodes the scrambled input and produces the TV out.
STB :~ Set-Top Box
• Does QAM demodulation .
• DVB-C type set top boxes work on co-axial cable.
• IPTV set-top boxes need IPTV networks.
• IPTV boxes allows internet connectivity .
• Each STB has a unique identity either using MAC
address or using a smart card.
STB Unique Identity
• Video removed visit
garage4hackers.com/blog.php?u=8
DVB-C Set-top box
• Works on Digital Video Broadcasting standard,
the same standard is used for satellite
broadcasting.
• Works based on [64,128, 256 QAM ]
modulation, a combination of amplitude and
phase modulation.
• DVB-C is used for broadcasting Audio, Video
signals.
Source: Understanding Digital Television: An Introduction to DVB Systems with
IPTV
• IP Set-Top Boxes enable Video Services
connected through IP network.
• Protocols like http, rtsp , igmp are used in
streaming the video.
• IPTV can carry Audio, video and data over the
wire aka [ Triple play].
• Internet Access is possible using IPTV.
Digital Cable Overall
• Satellite Content
• IRD decoders
• DRM Server
• Middleware Servers
• Video on Demand Server
• Billing Server
• Triple Play Convergence
• Switch
• QAM Modulator
• Network Infrastructure
• Micro PoP
• Access Switch
• Customer Premise Equipment
• Set Top Box
 Source [ Head End ].
 Management Network or Middlewares.
 Home Network
Digital Cable Network :~
Attacking Digital Network
Home TV Set-
Top Box
Local Cable TV
Operator
Decoder
Unit
Management Network
Scrambled Signal
on Optical Fiber
Coaxial Cables
Digital
Signal
Attack Vectors
Management Network
DVB Headend
 Billing Server [ Web Application Bug ]
Attacking Set-Top boxes
 Firmware Attack [ Application Bug ]
 Protocol Attacks [Protocol Implementation Bug ]
Management Server [Middleware]
• Provides Billing and Customer Service.
• Attacks on Middleware are possible in both DVB-C and IPTV networks
Locating the Mother Program
• Network fingerprinting –Find IPTV Management service.
• Some are Internet facing !!
Bug 1:~ STB Hijack
• Application allows one operator to transfer STB to
another operator.
• This option lists all Existing operators.
• Transfer option based on an Access Key.
• The Access key implementation was flawed.
Spot the Bug
Old bug PHP < 5.3.* : Passing an array will bypass the check.
<?php
$
$apikey = "select api_key from apis where
username=.'mysql_escape($username)'";
$authenticated = strcmp($apikey, $_GET['key']);
if ($authenticated == 0) {
print "Logged IN !";
} else {
print "wrong API!";
}
?>
Voila: IPTV Management Console
• Video removed visit
garage4hackers.com/blog.php?u=8
Bug 2: Cable TV Remote shutdown
• Cable TV Operators control Clients via UAKEY.
• This is accomplished via API Keys specific to the logged in
admin.
• The implementation was flawed.
• The bug allowed a remote cable operator visiting a
malicious webpage to remotely shutdown all Digital Tv
instances.
API Key Implementation
<script src=“load_secrets.js”></script>
They had some pretty cool anti-stealing code as well.
function checkUrl()
{
var url = get_current_url();
return url.match(url+'$') == 'flappybirds.com';
}
if(checkUrl())
{
var api_key = "77d11aea20ff61c6d1e23f044";alert(api_key);
populateFormFields(super_secret); // Injects this token into the hidden input fields
} else{
alert('Bad Domain !');
}
Lets do some cross-domain magic
• Attacker can load, <script src=“load_secrets.js”></script>
• But, checkAdmin() returns false.
• Attacker can bypass this using,
// From attacker.com
<script>
String.prototype.match = function()
{
return ["flappybirds.com"];
}
</script>
<script src=“http://cable-tv.com/api_keys/load_secrets.js”></script>
Demo Video: Remote
• Video removed visit
garage4hackers.com/blog.php?u=8
Remote Denial of Service
Attacking Set-Top boxes
 Firmware Attack (1) [MPEG Parsing Bugs ]
Firmware Attack (2) [ Application Bug ]
Fuzzing DVB [Mpeg 2 ] STB
• The DVB Transport stream use MPEG format.
• If we can find bugs in mpeg/DVB parsing, then we
can do remote attacks.
• Fuzz a particular PES program
Our Fuzzer.
MPEG
Fuzz
payload
DVB-C Setup box
DVB-C TS
DVB
Modulator
[muxed into
DVB TS]
To
Bug 3: STB DVB MPEG stream parsing
Segfault.
• SIGSEGV due to buffer overflow.
• Buffer over flow is due to memory overwrite
• This bug would cause the STB to restart .
The transmission channel is Encrypted
MITM in Digital Networks:
DVB Transport stream Working
• DVB in Action:
• Provide Audio : Video streams to TV (Transport Stream).
• Provide Internet Connection [IP over DVB/MPEG ].
• Can provide multiple channels in a single stream.
• Payload of a Stream = [Audio + Video + Stream Info ]
• Stream Info = Ex : Program Association Table
• Program Association Table provide:
• PID values for (TS) packets corresponding (PMT) .
• PID stands for Packet Identifier .
• PMT (Program Map Table) provide location of cells that make up
each stream.
Program Association Table:
[Transport Stream Structure]
• DVB-C uses MPEG-2 TS [ Transport Streams].
• It transmits multiple [muxed multiplexed] channels [A : V ] .
• (MPEG TS) encapsulates all data streams in cells of 188 bytes .
• 4 byte header + 184 byte payload = 188 byte MPEG TS.
• DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS.
DVB-CSA Scrambling Algorithm
• DVB-CSA is the symmetric cipher used to protect
content of MPEG2 TS.
• DVB-CSA works in 2 passes.
Taking care of Encryption problem:
MITM Fuzzing breaking Encryption:
• The Transport Scrambling [2 bits] in TS header
indicates whether the packet is encrypted or
unencrypted.
• If both bits are set to zero , there is no scrambling.
• If one of the two is not zero they payload part is
scrambled.
• Most DVB STB implementations use this filed to
detect scrambling.
This way you can introduce Unencrypted cells to
DVBC stream and make STB parse them.
Demo: Poc crashing STB:
• Video removed visit
garage4hackers.com/blog.php?u=8
STB Firmware Update
• STB boots up and authenticates to Home
gateway.
• In case of DVB multicast it uses DSM-CC for
firmware delivery.
• In case of DVB [IPTV] unicast it checks a
middleware server for updates, if any available
download it via TFTP .
• Reboots and install new firmware.
STB Bootup: Video
• Video removed visit
garage4hackers.com/blog.php?u=8
DSM-CC [Data over DVB ]
• It is basically encapsulation of data in DVB transport
stream [MPEG 2 ].
Applications:
1. STB firmware updates.
2. STB application software download.
Middleware server used to push STB
Updates
Backdoor Firmware:~ Video
• Video removed visit
garage4hackers.com/blog.php?u=8
Thank You !!
Thanks to Ahamed Nafeez
• Security Engineer
• Client side and network
security
• blog.skepticfx.com
• @skeptic_fx
Thanks to Mrityunjay Gautam
• Garage4Hackers.com
• https://twitter.com/fb1h2s
• https://www.facebook.com/loverahulsas
• www.linkedin.com/in/fb1h2s
• https://twitter.com/garage4hackers
• https://www.facebook.com/Garage4Hackers
Questions ?

More Related Content

Similar to Hacking cable TV Networks Like Die hard Movie

Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Anees Akhtar
 
Communication medium in modern tv
Communication medium in modern tvCommunication medium in modern tv
Communication medium in modern tvHarsh Mehta
 
15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)宥均 林
 
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingAn Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingRobin Beregovska
 
Broadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiBroadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiSSPI Brasil
 
Sloc product brief
Sloc product briefSloc product brief
Sloc product briefmilarisaumil
 
TV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismTV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismMuhammad Safeer Aabbasi
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiSSPI Brasil
 
DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2Rufael Mekuria
 

Similar to Hacking cable TV Networks Like Die hard Movie (20)

Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)
 
Communication medium in modern tv
Communication medium in modern tvCommunication medium in modern tv
Communication medium in modern tv
 
IPTV Basics
IPTV BasicsIPTV Basics
IPTV Basics
 
Ip live production
Ip live productionIp live production
Ip live production
 
15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)15 selected topics for e-learning technologies (dtv)
15 selected topics for e-learning technologies (dtv)
 
digital tv DTMB
digital tv DTMBdigital tv DTMB
digital tv DTMB
 
Configuring-Cisco-CME.ppt
Configuring-Cisco-CME.pptConfiguring-Cisco-CME.ppt
Configuring-Cisco-CME.ppt
 
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And TestingAn Experimental Architecture For Basic IPTV Concepts Implementation And Testing
An Experimental Architecture For Basic IPTV Concepts Implementation And Testing
 
Broadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspiBroadcast day-2010-comtech-sspi
Broadcast day-2010-comtech-sspi
 
Sloc product brief
Sloc product briefSloc product brief
Sloc product brief
 
TV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal MechanismTV (Television) A Brief Depiction of the internal Mechanism
TV (Television) A Brief Depiction of the internal Mechanism
 
MaxEye DVB Test and Measurement Solutions Overview
MaxEye DVB Test and Measurement Solutions OverviewMaxEye DVB Test and Measurement Solutions Overview
MaxEye DVB Test and Measurement Solutions Overview
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasi
 
Iptv presentation
Iptv presentationIptv presentation
Iptv presentation
 
DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2DVB-I masterclass introductions-packaging-encoding-v2
DVB-I masterclass introductions-packaging-encoding-v2
 
Dth slideshare.pptx
Dth slideshare.pptxDth slideshare.pptx
Dth slideshare.pptx
 
CCNA
CCNA CCNA
CCNA
 
Zee Vee Training
Zee Vee TrainingZee Vee Training
Zee Vee Training
 
Omid Technologies Products
Omid Technologies ProductsOmid Technologies Products
Omid Technologies Products
 
Iptv
IptvIptv
Iptv
 

More from Rahul Sasi

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC TalkRahul Sasi
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Rahul Sasi
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .Rahul Sasi
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.Rahul Sasi
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiRahul Sasi
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chainsRahul Sasi
 

More from Rahul Sasi (6)

CloudSeK COCON POC Talk
CloudSeK COCON POC TalkCloudSeK COCON POC Talk
CloudSeK COCON POC Talk
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
 
Java Exploit Analysis .
Java Exploit Analysis .Java Exploit Analysis .
Java Exploit Analysis .
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasi
 
Mac osx 64_rop_chains
Mac osx 64_rop_chainsMac osx 64_rop_chains
Mac osx 64_rop_chains
 

Recently uploaded

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Recently uploaded (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Hacking cable TV Networks Like Die hard Movie

  • 2. Hacking your Cable TV Network
  • 4. Today, we will Hack… • Analogue Cable TV • DVB-C • DVB-T [Satellite TV] • IPTV Intro
  • 5. Rahul Sasi • Security Engineer • Speaker. HITB [KL], BlackHat [US Arsenal], Cocon (2011, 2012, 2013), Nullcon (2011, 2012, 2013), HITB (AMS 2012), BlackHat (EU 2012), EKoparty (Argentina), CanSecwest(Canada 2013), HITcon(Taiwan) • One of the Admin members Garage4Hackers.com • https://twitter.com/fb1h2s
  • 7. Agenda • Analog Cable Networks.  Architecture  Introduction and Attacks • Digital Cable Networks .  Migration form Analog to Digital  Digital Network architecture  Application and Network layer bugs
  • 8. Analog Cable Network The Basics • FM Modulation And Broadcasting [TV Station] • Antenna Farm [ Cable Operator End] • IRD-Integrated Receiver Decoders. • Local cable network. • TV
  • 9. Analog Cable Network Home TV Local Cable TV Operator Decoder Unit QAM Signal Amplifier Optical Fiber Coaxial Cables
  • 12. One IRD per Channel
  • 14.
  • 15. QAM: Quadrature amplitude modulation • Analog + Digital Modulation • Modulates the amplitudes of analog waves, using AM • Modulates the amplitudes of digital waves, using ASK • Modulated waves are summed • Amplified and distributed via optic fiber Source: http://en.wikipedia.org/wiki/Quadrature_amplitude_modulation
  • 17. The transmission channel is Unencrypted
  • 18. Cable Operation • Each channel received would be under a particular frequency. • Cable Operators could modulate to any frequency. • FDMA is used to sent all the different channels to users. • The transmission medium is Radio over Fiber. • TV channels tunes in individual frequency and decodes them to audio and video.
  • 19. Attacking Analog Network Home TV Local Cable TV Operator Decoder Unit QAM Signal Amplifier Optical Fiber Coaxial Cables MITM
  • 20. MITM:~ Local Cable Operator$ • Easy MITM: No Encryption in Analog Network • Physical access = Free cable connection. Or • You can even Broadcast your own signals.
  • 21. DTK: Our MITM unit Operator end:~ Devices used • Optical Receiver • Optical to Coaxial • RF modulator • Amplifier • Signal Tap Total: 80 usd
  • 23. Local cable operator • Fiber optic is fast and reliable but expensive. • Doing a Man-In-Middle on Fiber optic is expensive [atleast for us]. • Local cable admins convert optic input to co-axial. • Coaxial cable could be easily tapped. Optical Receiver:~
  • 24. Device:~ optical to coaxial Coaxial out Optic IN
  • 25. MITM:~ Tap and inject signals
  • 26. The Process:~ For example • BBC news would be in frequency A and Fox news on frequency B. • Both these frequency signals are sent over coaxial cable. • TV knows how to decode each frequencies. • So channel no 1 would be pre-set to display BBC [Frequency A] and channel no 2 would be set to display “FOX NEWS ” [Frequency B]. • As a hacker if I need to replace channels, one possibility is to do a man in the middle attack and modulate my videos with Star Movies frequency.
  • 28. Avoiding Collision • Let us shut down the original signal source. • Shutting down the entire signal source will stop all the channels. • Signal cutter to the rescue – Block FOX news Only. • Introduce our Video in Fox news Frequency
  • 29. Demo • Video removed visit garage4hackers.com/blog.php?u=8
  • 30. Digital TV Introduction • In December 2011, the Lok Sabha passed Cable Television Networks (Regulation) Amendment Bill. • In the Act the addressable system may only transmit encrypted signals. • So with this Act it is mandatory to install set-top boxes on every house for decoding the transmitted signals.
  • 31. Digital TV Introduction • Cable TV & Customers Upgrade to DVBC or IP network which can now transmit encrypted signals. • DVBC standard [Conditional Access] is an access control mechanism. • IPTV Networks are traditional TCP/IP Stack. • Now Signals are encrypted or scrambled before sent on wire. • A set-top box device is needed to de-scramble the output • STB decodes the scrambled input and produces the TV out.
  • 32. STB :~ Set-Top Box • Does QAM demodulation . • DVB-C type set top boxes work on co-axial cable. • IPTV set-top boxes need IPTV networks. • IPTV boxes allows internet connectivity . • Each STB has a unique identity either using MAC address or using a smart card.
  • 33. STB Unique Identity • Video removed visit garage4hackers.com/blog.php?u=8
  • 34. DVB-C Set-top box • Works on Digital Video Broadcasting standard, the same standard is used for satellite broadcasting. • Works based on [64,128, 256 QAM ] modulation, a combination of amplitude and phase modulation. • DVB-C is used for broadcasting Audio, Video signals. Source: Understanding Digital Television: An Introduction to DVB Systems with
  • 35. IPTV • IP Set-Top Boxes enable Video Services connected through IP network. • Protocols like http, rtsp , igmp are used in streaming the video. • IPTV can carry Audio, video and data over the wire aka [ Triple play]. • Internet Access is possible using IPTV.
  • 36. Digital Cable Overall • Satellite Content • IRD decoders • DRM Server • Middleware Servers • Video on Demand Server • Billing Server • Triple Play Convergence • Switch • QAM Modulator • Network Infrastructure • Micro PoP • Access Switch • Customer Premise Equipment • Set Top Box  Source [ Head End ].  Management Network or Middlewares.  Home Network
  • 38. Attacking Digital Network Home TV Set- Top Box Local Cable TV Operator Decoder Unit Management Network Scrambled Signal on Optical Fiber Coaxial Cables Digital Signal
  • 39. Attack Vectors Management Network DVB Headend  Billing Server [ Web Application Bug ] Attacking Set-Top boxes  Firmware Attack [ Application Bug ]  Protocol Attacks [Protocol Implementation Bug ]
  • 40. Management Server [Middleware] • Provides Billing and Customer Service. • Attacks on Middleware are possible in both DVB-C and IPTV networks Locating the Mother Program • Network fingerprinting –Find IPTV Management service. • Some are Internet facing !!
  • 41. Bug 1:~ STB Hijack • Application allows one operator to transfer STB to another operator. • This option lists all Existing operators. • Transfer option based on an Access Key. • The Access key implementation was flawed.
  • 42. Spot the Bug Old bug PHP < 5.3.* : Passing an array will bypass the check. <?php $ $apikey = "select api_key from apis where username=.'mysql_escape($username)'"; $authenticated = strcmp($apikey, $_GET['key']); if ($authenticated == 0) { print "Logged IN !"; } else { print "wrong API!"; } ?>
  • 43. Voila: IPTV Management Console • Video removed visit garage4hackers.com/blog.php?u=8
  • 44. Bug 2: Cable TV Remote shutdown • Cable TV Operators control Clients via UAKEY. • This is accomplished via API Keys specific to the logged in admin. • The implementation was flawed. • The bug allowed a remote cable operator visiting a malicious webpage to remotely shutdown all Digital Tv instances.
  • 45. API Key Implementation <script src=“load_secrets.js”></script> They had some pretty cool anti-stealing code as well. function checkUrl() { var url = get_current_url(); return url.match(url+'$') == 'flappybirds.com'; } if(checkUrl()) { var api_key = "77d11aea20ff61c6d1e23f044";alert(api_key); populateFormFields(super_secret); // Injects this token into the hidden input fields } else{ alert('Bad Domain !'); }
  • 46. Lets do some cross-domain magic • Attacker can load, <script src=“load_secrets.js”></script> • But, checkAdmin() returns false. • Attacker can bypass this using, // From attacker.com <script> String.prototype.match = function() { return ["flappybirds.com"]; } </script> <script src=“http://cable-tv.com/api_keys/load_secrets.js”></script>
  • 47. Demo Video: Remote • Video removed visit garage4hackers.com/blog.php?u=8
  • 48. Remote Denial of Service
  • 49. Attacking Set-Top boxes  Firmware Attack (1) [MPEG Parsing Bugs ] Firmware Attack (2) [ Application Bug ]
  • 50. Fuzzing DVB [Mpeg 2 ] STB • The DVB Transport stream use MPEG format. • If we can find bugs in mpeg/DVB parsing, then we can do remote attacks. • Fuzz a particular PES program
  • 51. Our Fuzzer. MPEG Fuzz payload DVB-C Setup box DVB-C TS DVB Modulator [muxed into DVB TS] To
  • 52. Bug 3: STB DVB MPEG stream parsing Segfault. • SIGSEGV due to buffer overflow. • Buffer over flow is due to memory overwrite • This bug would cause the STB to restart .
  • 53. The transmission channel is Encrypted MITM in Digital Networks:
  • 54. DVB Transport stream Working • DVB in Action: • Provide Audio : Video streams to TV (Transport Stream). • Provide Internet Connection [IP over DVB/MPEG ]. • Can provide multiple channels in a single stream. • Payload of a Stream = [Audio + Video + Stream Info ] • Stream Info = Ex : Program Association Table • Program Association Table provide: • PID values for (TS) packets corresponding (PMT) . • PID stands for Packet Identifier . • PMT (Program Map Table) provide location of cells that make up each stream.
  • 56. [Transport Stream Structure] • DVB-C uses MPEG-2 TS [ Transport Streams]. • It transmits multiple [muxed multiplexed] channels [A : V ] . • (MPEG TS) encapsulates all data streams in cells of 188 bytes . • 4 byte header + 184 byte payload = 188 byte MPEG TS. • DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS.
  • 57. DVB-CSA Scrambling Algorithm • DVB-CSA is the symmetric cipher used to protect content of MPEG2 TS. • DVB-CSA works in 2 passes.
  • 58. Taking care of Encryption problem:
  • 59. MITM Fuzzing breaking Encryption: • The Transport Scrambling [2 bits] in TS header indicates whether the packet is encrypted or unencrypted. • If both bits are set to zero , there is no scrambling. • If one of the two is not zero they payload part is scrambled. • Most DVB STB implementations use this filed to detect scrambling.
  • 60. This way you can introduce Unencrypted cells to DVBC stream and make STB parse them.
  • 61. Demo: Poc crashing STB: • Video removed visit garage4hackers.com/blog.php?u=8
  • 62. STB Firmware Update • STB boots up and authenticates to Home gateway. • In case of DVB multicast it uses DSM-CC for firmware delivery. • In case of DVB [IPTV] unicast it checks a middleware server for updates, if any available download it via TFTP . • Reboots and install new firmware.
  • 63. STB Bootup: Video • Video removed visit garage4hackers.com/blog.php?u=8
  • 64. DSM-CC [Data over DVB ] • It is basically encapsulation of data in DVB transport stream [MPEG 2 ]. Applications: 1. STB firmware updates. 2. STB application software download.
  • 65. Middleware server used to push STB Updates
  • 66. Backdoor Firmware:~ Video • Video removed visit garage4hackers.com/blog.php?u=8
  • 68. Thanks to Ahamed Nafeez • Security Engineer • Client side and network security • blog.skepticfx.com • @skeptic_fx Thanks to Mrityunjay Gautam
  • 69. • Garage4Hackers.com • https://twitter.com/fb1h2s • https://www.facebook.com/loverahulsas • www.linkedin.com/in/fb1h2s • https://twitter.com/garage4hackers • https://www.facebook.com/Garage4Hackers Questions ?

Editor's Notes

  1. Video from Die Hard 4.0
  2. Television is a one- way medium unlike Internet. So if someone hack into your TV provider and stream in a Video stating than a riot has started in the nearby village/city, that can cause enough panic. We will explain both analog and digital cable networks.
  3. We will see technologies behind these networks and show how to hack into them.
  4. I am not even from the signals world, am just an application security guy. But I find it bad not knowing how my TV works and calling myself a Hacker.
  5. FM Modulation And Broadcasting [TV Station] Antenna Farm [ Cable Operator End] IRD-Integrated Receiver Decoders. Local cable network. TV
  6. Multiple antennas are necessary for cable operators to capture individual channel signals from multiple satellites. These signals are decoded using an IRD decoder units [Integrated Decoder] . The decoded signal are modulated . The modulators are connected together to sent the entire collected channels to a QAM. To distribute signals optic fiber cables are used. At a local cable distributor end the optic cable is replaced with co-axial cable. Amplifiers were introduced in each nodes to keep signals strong.
  7. The head end receives the radio signal and uses the IRD to tune and amplify the signal. Once the signal is amplified, the IRD decodes the signal. IRD Convert the RF signals to Analog signals. Here each channel is frequency modulated by the modulator. So HBO would be in a particular frequency and National channel would be in another.
  8. IRD provider by the channel companies.
  9. QAM stands for quadrature amplitude modulation, the format by which digital cable channels are encoded and transmitted via cable television providers. http://en.wikipedia.org/wiki/QAM_(television)
  10. Quadrature amplitude modulation (QAM) is both an analog and a digital modulation schem It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves, using the amplitude-shift keying (ASK) digital modulation scheme or amplitude modulation (AM) analog modulation scheme. The modulated waves are summed, and the resulting waveform is a combination of both phase-shift keying (PSK) and amplitude-shift keying (ASK) The signals are amplified and distributed via optic fiber.
  11. Each channel received would be under a particular frequency. The cable operator can modulate it to a different frequency if they want and sent it on wire from head end. Certain national channels need to go in the same frequency they came in. Now with FDMA all the many different channels are sent to the users via a fiber cable. The transmission medium is Radio over Fiber. TV channels tunes in individual frequency and decodes them to audio and video.
  12. Multiple antennas are necessary for cable operators to capture individual channel signals from multiple satellites. These signals are decoded using an IRD decoder units [Integrated Decoder] . The decoded signal are modulated . The modulators are connected together to sent the entire collected channels to a QAM. To distribute signals optic fiber cables are used. At a local cable distributor end the optic cable is replaced with co-axial cable. Amplifiers were introduced in each nodes to keep signals strong.
  13. Analog network vulnerable to MITM since no Encryption. If you have physical access to these networks then you can easily have free cable connection. Or you can even Broadcast your own signals. The following cheap devices were enough to perform a MITM on Analog networks.
  14. RF modulator : An RF modulator, takes an input signal and outputs a radio frequency-modulated signal. Amplifier : Boost the output signal. Signal Cutter: Chop down a specified frequency . Signal Tap: Can inject signal into the existing signals. Optical Receiver :Reads optical inputs. Optical to Coaxial: Converts Optical input to Coaxial output. Total: 3000 RS
  15. When doing man in the middle you need to avoid collision. It could be done by fully shutting down the original signal source . Shutting down the entire signal source will stop all the channels going offline. Or include a signal cutter, that will chop reduce the signals so that the existing NDTV frequency is reduced to something else. Introduce our custom video in the frequency of fox news and game over.
  16. Nafeez
  17. there are many dvb standards, each developed for its own intended use. the first of the dvb standards to be agreed upon by etsi and others was the dvb-s standard (1994) for satellite transmission. dvb-t is used for ter- restrial transmissions, and was commercialized around 1997. dvb-c is used in cable transmissions.
  18. DVB headend DVB-C system is the information exchange center, responsible for signals, treatment and control, complete signal input, signal processing, signal output and conditions, and programs receive management, customer management, system management, and other functions. Source: http://www.chinaotec.com/en/shownew.asp?id=14 Does signal processing, Customer management .System management.
  19. Spent 1 minute on this slide.
  20. Middleware Servers These are servers that provide the billing and customer services. Attacks on Middleware are possible in both DVB-C and IPTV networks Locating the Mother Program: Some network fingerprinting will provide details of the Web Application used to manage the IPTV service. Sometimes few of these controllers are accessible on the Internet.
  21. The cable TV local operators control panel can do stuff like shutting down access, send messages to individual clients etc by specifying the client’s UAKEY.
  22. They have a super secret JS file, which gets dynamically loaded for a given admin.
  23. Spent 1 minute on this slide.
  24. Tips: Before writing a fuzzer always check other mpeg parsing applications source code .
  25. We waited for the stb to crash and restart. So mostly stared at the TV.
  26. Finding a Bug in a media parser is to easy job.
  27. http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-smart-tv-fuzzing.pdf
  28. cable companies deliver one dvb stream to the tv. this stream contains several channels, each on its own frequency. the channels are com- bined, or “muxed” into one transport stream and delivered to the tv, which “demuxes” the signal so it can be “read” from the various channels. in addition to the audio/video streams (the payload), there are also a number of tables included in the transport stream. these tables provide the tv with information about the stream. an example is the Program association table, which lists all available programs in the transport stream. Source: http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-smart-tv-fuzzing.pdf
  29. Sample picture shows data populated using PAT info. Program Association Table (PAT): for each service in the multiplex, the PAT indicates the location (the Packet Identifier (PID) values of the Transport Stream (TS) packets) of the corresponding Program Map Table (PMT). It also gives the location of the Network Information Table (NIT). Ref: http://www.etsi.org/deliver/etsi_en/300400_300499/300468/01.03.01_60/en_300468v010301p.pdf
  30. A good tool to inspect DVB stream is Dvsnoop: http://dvbsnoop.sourceforge.net/examples/example-ts.html Image: http://www.althos.com/sample_diagrams/ag_MPEG_TS_Packet_low_res.jpg More detailed structure diagram: http://www.jdsu.com/ProductLiterature/MPEG_Poster_lowrez.pdf Each field explained: http://www.erg.abdn.ac.uk/future-net/digital-video/mpeg2-trans.html
  31. Pass 1: The plaintext of the payload is split into blocks of 64 bit length. The remainder that is smaller than 64 bit; all blocks except this remainder are then encrypted with a custom block cipher in CBC mode, using reverse block order and all zero initialization vector. Pass 2: In the second pass, a stream cipher using the first block (last block in the order used with the block cipher) as initialization vector encrypts all data again, except the first block. Note that DVB-CSA does not randomize the ciphertexts: Equal plaintexts are always mapped to the same ciphertexts Ref: https://www.cdc.informatik.tu-darmstadt.de/~jwaelde/breaking-dvbcsa.pdf
  32. The DVB-C decryption keys for the scrambling algorithm are in the STB [removable cards] or hardcoded . There are multiple papers that document ways to effectively break DVB-CSA and recover encryption key. Our aim is to inject our own streams into the network and make the end user STBs parse them. There is a better way doing it rather than breaking the key.
  33. The header starts with a well-known Synchronisation Byte (8 bits). This has the bit pattern 0x47 (0100 0111). A set of three flag bits are used to indicate how the payload should be processed. Ref: http://www.erg.abdn.ac.uk/future-net/digital-video/mpeg2-trans.html The first flag indicates a transport error. The second flag indicates the start of a payload (payload_unit_start_indicator) The third flag indicates transport priority bit. The flags are followed by a 13 bit Packet Identifier (PID). This is used to uniquely identify the stream to which the packet belongs (e.g. PES packets corresponding to an ES) generated by the multiplexer. The PID allows the receiver to differentiate the stream to which each received packet belongs. Some PID values are predefined and are used to indicate various streams of control information. A packet with an unknown PID, or one with a PID which is not required by the receiver, is silently discarded. The particular PID value of 0x1FFF is reserved to indicate that the packet is a null packet (and is to be ignored by the receiver). The two scrambling control bits are used by conditional access procedures to encrypted the payload of some TS packets. Two adaption field control bits which may take four values: 01 – no adaptation field, payload only 10 – adaptation field only, no payload 11 – adaptation field followed by payload 00 - RESERVED for future use Finally there is a half byte Continuity Counter (4 bits)
  34. Reference: http://www.etsi.org/deliver/etsi_ts/102800_102899/102824/01.02.01_60/ts_102824v010201p.pdf