ARDrone corruption
Tóm tắt
A drone is a machine which functions either by the remote control of a navigator or pilot or autonomously, that is, as a self-directing entity. Their largest use is within military applications. This machines are smaller than piloted vehicle and so are less visible or invisible (furtive). The goal of our study is to show, on a commercial drone, the effect of the miniaturization. We use the Ardrone by Parrot, and different attacks are performed, from the DOS attack to the illegal takeover of the drone. Attacks are explained and detailed, to allow the readers to replay the attacks.
Tài liệu tham khảo
Raqi insurgents hacked Predator drone feeds, U.S. official indicates, CNN. http://articles.cnn.com/2009-12-17/us/drone.video.hacked_1_uav-systems-encryption-feeds?_s=PM:US
Computer Virus Hits U.S. Drone Fleet, Wired Magazine. http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/
Parrot, ArDrone. http://ardrone.parrot.com/parrot-ar-drone/fr/
Parrot, ArDrone API. http://projects.ardrone.org/
Turning the Parrot AR.Drone into an autonomous UAV. http://diydrones.com, http://diydrones.com/profiles/blogs/turning-the-parrot-ardrone
Programming and controlling the ARDrone with Urbi, Jean Charles Mammana. https://projects.ardrone.org/boards/1/topics/show/747
SkyNET: a 3G-enabled mobile attack drone and stealth botmaster. In: Reed, T., Geis, J., Dietrich, S., (eds.) Proceedings of the 5th USENIX conference on Offensive technologies
List of Linux distributions, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=List_of_Linux_distributions&oldid=457844580
Wireshark. http://www.wireshark.org/
Tcpdump. http://www.tcpdump.org/
Aircrack-ng. http://www.aircrack-ng.org/
ASCII, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=ASCII&oldid=457780963
Hayes command set, In Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Hayes_command_set
Nmap Security scanner. http://nmap.org/
MAC filtering. In Wikipedia, The Free Encyclopedia. (from http://en.wikipedia.org/w/index.php?title=MAC_filtering&oldid=432602911)
Telnet, Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/wiki/Telnet
CodeSourcery, G++ Lite 2009q1-203 for ARM GNU/Linux. http://www.codesourcery.com/sgpp/lite/arm/portal/release858
Video for Linux 2 specification. http://v4l2spec.bytesex.org
Linux, Ioctl Man page. http://www.kernel.org/doc/man-pages/online/pages/man2/ioctl.2.html
Hping3, Hping Active Network Security Tool. http://www.hping.org/
Scapy. http://www.secdev.org/projects/scapy
Wifitap. http://sid.rstack.org/static/articles/w/i/f/Wifitap.html
Linux System call, Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/System_call
The Linux Kernel Module Programming Guide,How Do Modules Get Into The Kernel. http://tldp.org/LDP/lkmpg/2.4/html/x49.html
Rootkit kernel sous Linux 2.6, Blog communautaire nibbles. http://blog.nibbles.fr/1021
Mplayer. http://www.mplayerhq.hu/
Mjpeg Tools, Jpeg2YUV. http://mjpeg.sourceforge.net/
The Z Shell. http://www.zsh.org/