ARDrone corruption

Springer Science and Business Media LLC - Tập 8 - Trang 15-27 - 2011
Eddy Deligne1
1DCNS, ESIEA-Ouest, Polytechnique, Toulon, France

Tóm tắt

A drone is a machine which functions either by the remote control of a navigator or pilot or autonomously, that is, as a self-directing entity. Their largest use is within military applications. This machines are smaller than piloted vehicle and so are less visible or invisible (furtive). The goal of our study is to show, on a commercial drone, the effect of the miniaturization. We use the Ardrone by Parrot, and different attacks are performed, from the DOS attack to the illegal takeover of the drone. Attacks are explained and detailed, to allow the readers to replay the attacks.

Tài liệu tham khảo

Raqi insurgents hacked Predator drone feeds, U.S. official indicates, CNN. http://articles.cnn.com/2009-12-17/us/drone.video.hacked_1_uav-systems-encryption-feeds?_s=PM:US Computer Virus Hits U.S. Drone Fleet, Wired Magazine. http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/ Parrot, ArDrone. http://ardrone.parrot.com/parrot-ar-drone/fr/ Parrot, ArDrone API. http://projects.ardrone.org/ Turning the Parrot AR.Drone into an autonomous UAV. http://diydrones.com, http://diydrones.com/profiles/blogs/turning-the-parrot-ardrone Programming and controlling the ARDrone with Urbi, Jean Charles Mammana. https://projects.ardrone.org/boards/1/topics/show/747 SkyNET: a 3G-enabled mobile attack drone and stealth botmaster. In: Reed, T., Geis, J., Dietrich, S., (eds.) Proceedings of the 5th USENIX conference on Offensive technologies List of Linux distributions, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=List_of_Linux_distributions&oldid=457844580 Wireshark. http://www.wireshark.org/ Tcpdump. http://www.tcpdump.org/ Aircrack-ng. http://www.aircrack-ng.org/ ASCII, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=ASCII&oldid=457780963 Hayes command set, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Hayes_command_set Nmap Security scanner. http://nmap.org/ MAC filtering. In Wikipedia, The Free Encyclopedia. (from http://en.wikipedia.org/w/index.php?title=MAC_filtering&oldid=432602911) Telnet, Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/wiki/Telnet CodeSourcery, G++ Lite 2009q1-203 for ARM GNU/Linux. http://www.codesourcery.com/sgpp/lite/arm/portal/release858 Video for Linux 2 specification. http://v4l2spec.bytesex.org Linux, Ioctl Man page. http://www.kernel.org/doc/man-pages/online/pages/man2/ioctl.2.html Hping3, Hping Active Network Security Tool. http://www.hping.org/ Scapy. http://www.secdev.org/projects/scapy Wifitap. http://sid.rstack.org/static/articles/w/i/f/Wifitap.html Linux System call, Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/System_call The Linux Kernel Module Programming Guide,How Do Modules Get Into The Kernel. http://tldp.org/LDP/lkmpg/2.4/html/x49.html Rootkit kernel sous Linux 2.6, Blog communautaire nibbles. http://blog.nibbles.fr/1021 Mplayer. http://www.mplayerhq.hu/ Mjpeg Tools, Jpeg2YUV. http://mjpeg.sourceforge.net/ The Z Shell. http://www.zsh.org/