Jump to content

Skyjack module? Deauth & Hijack Ar.Drones


Darren Kitchen
 Share

Recommended Posts

Well I know the perl script and all of the aircrack magic should work no problem. I really don't care to fly the drones - maybe just send a command to say "turn off motors" and have 'em fall out of the sky. Then we could strap a MK5 to a DJI Phantom and have it pwn the AR.Drone. Do I hear a segment coming on? Just need to find an alternative to the node interface program.

...Off to read the AR.Drone control protocol :)

Link to comment
Share on other sites

Seems the AR.Drone has a default IP address of 192.168.1.1 and listens for UDP instruction packets on port 5556. Each UDP packet has an incremented sequence number. Should simply be a matter of sniffing one and doing a replay attack. There seem to be a bunch of built in commands for taking off, hovering and landing in the SDK. I'm feeling pretty good about this.

If the version of netcat on the MK5 support the -u option for UDP this should be fairly simple.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...