TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How vulnerable is Russian military hardware to hacking?

4 点作者 0898大约 3 年前
If there&#x27;s one thing I&#x27;ve learned from listening to the Darknet Diaries podcast, it&#x27;s that almost any important piece of computerised equipment is vulnerable to sabotage. Even obscure industrial controllers in oil refineries can be damaged if you&#x27;re familiar with how they work, and you&#x27;re creative enough to nudge them into an unsafe state.<p>So when I see that 64km military convoy outside Kyiv...<p>...full of heavily armoured vehicles and brutal looking military gear...<p>...I naturally wonder: how much of this kit is computerised? How vulnerable is it to malicious code?<p>Instead of taking down websites, could Anonymous reasonably develop a 0-day for the 9K720 short-range tactical ballistic missile system? Does the Koalitsiya-SV 152mm self-propelled howitzer even have Wi-Fi?<p>This is just a random Sunday morning thought, but I&#x27;d be interested if anybody can enlighten me on any of this.

1 comment

azalemeth大约 3 年前
Firstly, I&#x27;m sure with physical access you could brick certain digital components. But a lot of the hardware is from the soviet era -- see, e.g. [1] for a relatively accurate list of destroyed hardware on both sides, backed up by social-media posted photos -- and therefore almost by definition will not have large, complex integrated computers with a large attack surface. There are some videos of the inside of the tanks doing the rounds on social media: if anything, a lot of the &quot;driving&quot; looks like driving a 1950s tractor more than a modern machine.<p>The only high-tech devices are likely to be anything to do with radar, communications, night-vision, or fire-control computers. While some of these are networked, they&#x27;re not exactly going to be running a detailed tcp&#x2F;ip stack. Howitzers are not going to have wifi. They&#x27;re probably going to be entirely usable with nothing more than an analogue or paper-based fire control computer.<p>Secondly, military vehicles (and vehicles in general) are designed to be very robust to computer failure and fail safe. Russia has its own processor, the Elbrus, and anything &quot;actually sensitive&quot; is almost certainly built on that unfamiliar, probably-not-backdoored, basis. Military systems in the west use everything from port knocking to asymmetric crypto with signing certificates stored thousands of miles away to make this sort of approach unlikely.<p>Instead, what I think is more likely is that the ukranian air force is in a better state than expected because they&#x27;ve effectively infiltrated Russia&#x27;s identity friend-or-foe (IFF) system. All of those captured AA &#x2F; SAM sites are information goldmines and means that it&#x27;s going to be very difficult for them to work out who is on whose side. There must have been a nonzero number of friendly fire incidents on the russian side, of that I am sure.<p>[1] <a href="https:&#x2F;&#x2F;www.oryxspioenkop.com&#x2F;2022&#x2F;02&#x2F;attack-on-europe-documenting-equipment.html" rel="nofollow">https:&#x2F;&#x2F;www.oryxspioenkop.com&#x2F;2022&#x2F;02&#x2F;attack-on-europe-docum...</a>
评论 #30577975 未加载