• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / infosec / Drone Operation and Demolition Guide

Drone Operation and Demolition Guide

21/02/2021 20:14 by Anastasis Vasileiadis

In this guide we will show you how to get full access to a Drone, using pentesting techniques, with Dronesploit. This tool was presented at the Black Hat Europe Arsenal 2019 and you can download the presentation from here.DroneSploit - Drone Operation and Demolition Guide

 

DroneSploit was created by Alexandre D'Hondt and Yannick Pasquazzo. The program is still under development, and both developers are working to improve its capabilities.

Currently, DroneSploit is designed to target only WiFi-controlled drones and includes a set of modules (based on Aircrack-NG) that allow users to hack those that are not configured correctly.

DroneSploit currently supports modules for C-me and Flitt drones (Hobbico). New modules for other brands and models (including Parrot and DJI) are in development and will be added soon.

Hack a Drone using Dronesploit

Dronesploit is available at PyPi and you can install it with the following command:

pip3 install dronesploit

1. Run the dronesploit

$ python3 main.py --help
usage: ./main.py <span class="or">[</chip>--giant<span class="or">]</chip> <span class="or">[</chip>-h<span class="or">]</chip> <span class="or">[</chip>-v<span class="or">]</chip>

Main

optional arguments:
  --dev development mode <span class="or">(</chip>default: False<span class="or">)</chip>

extra arguments:
  -h, --help show this <span class="nb">help</chip> message and <span class="nb">exit</chip>
  -v, --verbose verbose mode <span class="or">(</chip>default: False<span class="or">)</chip>
<span class="or"></chip>

The console ran main.py. It can request sudo rights, as it must have permission to set up WiFi.

$ python3 main.py
<span class="or">[</chip>sudo<span class="or">]</chip> Password <span class="k">for</chip> user:

<span class="or">[</chip>...<span class="or">]</chip>

At startup, a banner is displayed and a summary of the available modules is displayed.

68747470733a2f2f64686f6e6474612e6769746875622e696f2f64726f6e6573706c6f69742f646f63732f696d672f64726f6e6573706c6f69742e706e67 - Οδηγός εκμετάλλευσης και κατάρριψης Drone

The show issues command allows you to specify how any problems that may arise can be fixed, as you can see in the image above.

2.1 We run the program as an administrator

dronesploit &gt; <span class="nb">help</chip>
<span class="or">[</chip>...<span class="or">]</chip>

The command will show us many sections on our screen.

  • General commands are always displayed, as you will see below.

help general - Drone Operation and Demolition Guide

  • Specific commands are displayed according to the current console. Let me show you exactly what I mean:

help others - Drone Operation and Demolition Guide

2.2 Viewing the contents of our console

dronesploit &gt; <span class="k">select</chip> <span class="nb">test tanks</chip>
dronesploit<span class="or">[</chip>test tanks<span class="or">]</chip> &gt; <span class="nb">help</chip>
<span class="or">[</chip>...<span class="or">]</chip>

Now we see again the general commands that appear in the help section. To take a look at the available options:

help project - Drone Operation and Demolition Guide

2.3 Looking at the modules

dronesploit<span class="or">[</chip>test tanks<span class="or">]</chip> &gt; use auxiliary/Wireless/deauth
dronesploit<span class="or">[</chip>test tanks<span class="or">]</chip> auxiliary<span class="or">(</chip>Wireless/deauth<span class="or">)</chip> &gt; <span class="nb">help</chip>
<span class="or">[</chip>...<span class="or">]</chip>

Now we see the general commands again but this time we focused on one of the available modules but also on the options it gives us, as you will see below:

help module - Drone Operation and Demolition Guide

3. Available modules

To see the list of available modules, just run the following command:

modules 768x582 1 - Drone Operation and Demolition Guide

In the above snapshot, one can see two units that are disabled, as shown at the start of the program.

4. Activate the monitor mode function

The ordertoggle Allows switching the WiFi function for a separate interface. It is completed automatically through the list of WiFi interfaces that exist in our system.

monitor mode - Drone Operation and Demolition Guide

When running, it switches between management and monitoring modes

managed mode - Drone Operation and Demolition Guide

5. Scan for available targets

The scan command allows fast scanning for targets (and requires a WiFi interface in monitoring mode).

scanning - Drone Operation and Demolition Guide

The targets command allows you to list the targets found as well as their characteristics.

targets list - Drone Operation and Demolition Guide

Available targets will continue to appear for about 5 minutes, which means that they will continue to appear after this time, but when you use the scan command again, the list will be updated (and nearby targets will disappear) .

6. Hacking the target

Now that we have found a target, we can launch an attack. To this end, we launch the appropriate attack for the specific target. Note that in the example below, the ESSID and INTERFACE options are automatically populated with the current information.

wpa2 psk attack - Drone Operation and Demolition Guide

The attack was successful and the password is now known.

targets with password - Drone Operation and Demolition Guide

Unfortunately, many commercial drones have the same default password. The password command allows you to enter the password without having to perform an attack.

targets password - Drone Operation and Demolition Guide

7. Connection with the goal

At this point, we have a password and our goal. We can connect to it using the connect command.

targets connect - Drone Operation and Demolition Guide

As shown in the snapshot above, the goal list now has a line with a strong indication to indicate that we are connected to that goal.

We can also link to another target as long as the password is the same.

targets connect another - Drone Operation and Demolition Guide

In the above case, we call a module for the required drone model that can not be found as connected to the attack machine.

If we display the options for this module, we get several required values ​​that unfortunately for us are not filled.

targets module required options - Drone Operation and Demolition Guide

8. Execution of a module

We can now use a module for the connected drone, using the use command.

targets module options - Drone Operation and Demolition Guide

In this example, one can see that the value for the TARGET option is filled in automatically. Our unit in this case, is immediately ready for execution.

 

Finally, we can execute the attack using the run command.

targets module run - Drone Operation and Demolition Guide

 

Drone Operation and Demolition Guide was last modified: 21 February, 2021, 8: 14 pm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: infosecDay: drone

You May Also Like

DJI Mini 2 small but powerful drone
Paladyne E1000MP Do drones bother you?
Drone with a security camera that flies into your home

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Is VPN illegal or legal?
Next Post: WhatsApp accounts will eventually be deleted? »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.