From the course: Ethical Hacking: Session Hijacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Getting more physical with drones

Getting more physical with drones - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Getting more physical with drones

- [Narrator] Two security researchers in Australia, Jeff Thomas and Xi Chen, have enhanced the original Kamkar attack on the control channel, and have provided demonstrations of two additional attacks, one on the video stream, and one on the telemetry link. These were demonstrated at the CivSec conference in Melbourne in June 2016. In their enhanced drone hijack attack, Jeff Thomas and Xi Chen are able to connect through the Parrot's Telnet channel, using the drone's IP address, which is always 192.168.1.1 on port 23, and establish a second user on the drone. They then add an iptables rule, to stop all but their IP address being accepted, thereby disconnecting the original user permanently. The drone is then controlled by their laptop, using application code written using the Robot Operating System. In their second attack, they hijack the video stream by using Aircrack-ng to monitor packets, and capture those on port 5555 into a .pcap file. The raw data for the whole conversation is…

Contents