Hitting the Black Hat Asia Summit: drones cannot escape the ship

Source: Internet
Author: User

Hitting the Black Hat Asia Summit: drones cannot escape the ship

 

 

Without an encrypted professional drone, Wi-Fi is easily hooked up, and the signal is copied, And then it flies away .....

Warning drones cannot escape the ship.

At the Black Hat Asia Summit, IBM Security Expert Nils Rodday said drones loaded with unencrypted chips would be hijacked by attackers, these drones are widely used in law enforcement, emergencies, and private sectors.

According to Rodday, hijacking of a drone that costs more than $28 thousand costs less than $40. Attackers can hijack a drone within two kilometers as long as they have more basic knowledge of radio communication.

In Europe, drones are widely used in emergency services, and this discovery undoubtedly makes the situation worse. Attacks against Xbee (a wireless transmission module based on ZigBee technology) chips have become quite common, in addition, drones are not limited to attacks.

A German drone researcher once worked with a vendor to research and crack drones and control their android applications. He found that, due to performance limitations, the Xbee chip in the drone is not encrypted, and after wireless connection, it can control flight devices less than 100 meters in the air. They are only subject to WEP (Wired Equivalent confidentiality) weak protection.

 

The hijacked drone is starting.

Man-in-the-middle attacks on drones

Rodday said at the black hat Asia Security Conference that the attacker completely controlled the drone by copying Android commands. He also demonstrated how to issue instructions to let the drone propeller start to rotate and take off.

"You can crack the Wi-Fi WEP encryption and then disconnect the original control end of the drone. You can connect the attacker's control end within 100 ." Roddy told reporters.

 

Nils Rodday in the live demonstration

Attackers conduct man-in-the-middle attacks on the Xbee link and insert command code between the drone and the control end two kilometers away. Attackers can remotely control drones and obtain packaged data, but Nils says with a smile:

"I believe most attackers will choose to steal it ."

 

Drone Signal Stream

Rodday indicates that if the Xbee application is encrypted, attackers may reject remote attack commands, which can mitigate man-in-the-middle attacks and traffic theft.

Rodday recommends that drone manufacturers encrypt the traffic of aircraft firmware and Android applications to avoid attacks.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.