Hacker Releases Software to Hijack Commercial Drones

3689562314?profile=original

I have some real concerns about this article.  Although this article talks about commercial hijacking, I feel this could very well happen to me and other hobbyists.  And what can DIY Drones help develop to reduce this probability?

http://defensetech.org/2013/12/09/hacker-releases-software-to-hijack-commercial-drones/?comp=1198882887570&rank=4

 

 

E-mail me when people leave their comments –

You need to be a member of diydrones to add comments!

Join diydrones

Comments

  • Link to comments from "Uncle Bill" (no relation) about the article: http://defensetech.org/2013/12/09/hacker-releases-software-to-hijac...

  • Turning other people’s drones into zombies requires a Parrot AR.Drone 2.0 quadricopter, which weighs less than a pound, a Rasberry Pi, a USB battery, an Alfa AWUSO36H wireless transmitter, aircrack-ng, nod-ar-drone, node.js and Kamkar’s SkyJack software, he says on his website.

    This was about as technical as the article got.  node-ar-drone and node.js provide an implementation of parrot ar.drone's wifi protocol.  aircrack-ng cracks wifi passwords.  From the sound of this, this hack only targets the ar.drone. 

    Preventing hackers is always important. The two obvious places a hacker could take over control signals is by overriding the standard rc radio, or by overriding the 915mhz radio.  The rc radio is a closed loop.  I don't see how a APM software mod can fix any vulnerabilities there.  Authentication and encryption could easily be implemented for the 915mhz modules (but would that be legal?).

    An analog video link will always be unencrypted.  No hope of making that safer, either.

This reply was deleted.