#HITB2023HKT #COMMSEC D2 LAB - Build Your Own Drone Attacking Device - Kelvin Wong

Děkujeme! Podělte se svými přáteli!

Nelíbí sa vám video. Děkujeme za zpětnou vazbu!

Vloženo před by admin
28 Zobrazení
This is a two hrs intensive workshop about building a device to attack consumer drones. It includes the common attack vectors from internal to external and modules on understanding drone signals.

Attack Vectors (common methods for drone hacking)

Firmware – modify or obfuscate the firmware
Applications – hijacking of the mobile devices or mal-application
Radio Frequency – focus on RF connection between the UAS and the operator, the best and most effective to terminate the control of drone

Radio Frequency and Video Transmission

This session will introduce the common signal transmission use for the remote controller and video broadcast in the drone market.

Common Frequencies: 433MHz, 915MHz, 2.4GHz & 5.8Ghz
Protocols: Lightbridge, OcuSync, ACCESS, ELRS, LoRa
Analog and Digital VTX system

Software Defined Radios

Will introduce the concept of the RF signals and how to generate them.

SDR device as correspondent with the GNURadio and GQRX. It can be used as a small jammer for testing and easy to understand the concept.
Exercise: Use of SDR devices and GNURadio Companion for the signal generation

Real world attacks / Using your newly created device

Here will illustrate how to build your own the device with step-by-step instructions including a demonstration of using your own-built device against the common small drones in the market. (e.g. Custom/Programmed waypoint drone and DJI drones.). Students will build a portable signal generator to hit the drones (a custom-made FPV drone ball with RF remote controller and video transmission system).

Technical requirements

Modern Windows / OS X laptop with admin privileges

20 sets of SDR devices (including Cloned HackRF and signal generators) will be provided for use during this lab

===

Captain Kelvin (a.k.a. Forensics and Hardware Ninja) is an independent security researcher. He is specialist in hardware analysis and digital forensics. He focus on the drone security and forensics researches. He was the first and the only one Asian who leaded a group of white-hat hackers to held an in-depth, hands-on drone and hardware hacking village in BLACK HAT and DEFCON. He was also a frequent speaker and trainer in different top-notch security and forensics conferences including SANS, HTCIA, DFRWS, HITB, SINCON and HITCON.
Kategorie
RC Vrtulníky

Napište svůj komentář

Komentáře

Buďte první, kdo to okomentuje!