Hack a Drone using Dronesploit

DroneSploit is a drone exploit that includes various techniques to gain access to it. It targets the commercial based on WiFi and first appeared in early December.

DroneSploit

 

Theoretically, drones are computers that "fly" and like all computers, can be vulnerable to attacks. They may also contain significant amounts of data that could be vulnerable to cyber threats. Understanding these risks can help you better secure your drone and prevent the loss of data or assets.

The framework consists of old and new types of attack against a variety of multiple drones, such as passive and active surveillance, deauth attacks and frameworks to break into drone-controller circuits. The goal is to automate the whole process and simply carry out and display the results in real time.

The framework is still limited in terms of hackable drone models based on WiFi (eg AR Drone, DJI Tello, Mavic Mini) but not RF based drones (DJI Phantom 4, Mavic Pro etc. .), but the goal is to collect so many exploits that it makes it easy to access vulnerable drones. With standard information security standards, it seeks to inform users of the dangers and to carry out simulated attacks against their own systems in order to better protect them.

For drones that allow modification of wireless points (WAP) και των συναφών κωδικών πρόσβασης, θα πρέπει να τα προσαρμόσετε πριν από τις πτήσεις. Απενεργοποιήστε την ανοικτή συνδεσιμότητα και βεβαιωθείτε ότι τα δίκτυα προστατεύονται με ενημερωμένα πρότυπα κρυπτογράφησης. Όπου είναι δυνατόν, χρησιμοποιήστε το φιλτράρισμα MAC για να διασφαλίσετε ότι μπορούν να συνδεθούν μόνο οι αξιόπιστες your. Check your drone action policy for what happens when the device loses connectivity and document the process for any unexpected actions it may take.

 

Installation:

This είναι διαθέσιμο στο PyPi και μπορεί απλά να εγκατασταθεί χρησιμοποιώντας το Pip:

root @ kali: ~ # pip3 install dronesploit

 

Basic functions:

Interface

DroneSploit

DroneSploit

Modules

This is an example of it of DroneSploit, which targets the the password or SSID of a specific drone model.

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive of new posts by email.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).