Security analysis of drones systems.pdf
4.4 MB
🔥Security analysis of drones systems: Attacks, limitations, and recommendations
UAV and drones use led to the rise of many security, safety and privacy issues, which were manifested through various cyber attacks, threats and challenges, listed and explained in this paper. Also, we presented a holistic view of the drones/UAVs domains and provided detailed explanation and classification of their use in various domains and for different purposes, in addition to the different lethal/non-lethal security solutions as part of drones/UAVs countermeasures.
Moreover, successful experiments to detect, intercept and hijack a drone through either de-authentication or jamming were highlighted, based on realistic scenarios that follow the traditional hacking cycle and hence, confirming the ease with which drones could be intercepted, especially in terms of UAV communication channels.
UAV and drones use led to the rise of many security, safety and privacy issues, which were manifested through various cyber attacks, threats and challenges, listed and explained in this paper. Also, we presented a holistic view of the drones/UAVs domains and provided detailed explanation and classification of their use in various domains and for different purposes, in addition to the different lethal/non-lethal security solutions as part of drones/UAVs countermeasures.
Moreover, successful experiments to detect, intercept and hijack a drone through either de-authentication or jamming were highlighted, based on realistic scenarios that follow the traditional hacking cycle and hence, confirming the ease with which drones could be intercepted, especially in terms of UAV communication channels.
👍3🔥3
How we Geolocated a Photo of a Russian Missile Programming Team
https://www.bellingcat.com/resources/2022/10/28/how-we-geolocated-a-photo-of-a-russian-missile-programming-team/
https://www.bellingcat.com/resources/2022/10/28/how-we-geolocated-a-photo-of-a-russian-missile-programming-team/
🔥3
🛸DJI Drone Vulnerability
In a recent investigation, Check Point Research discovered a vulnerability that, if exploited, would grant an attacker access to a user’s DJI account without the user being aware of it. CheckPoint research below explains how we were able to gain access to sensitive DJI drone flight information, as well as sensitive user data, across all three DJI platforms of Website, Mobile App and FlightHub.
In a recent investigation, Check Point Research discovered a vulnerability that, if exploited, would grant an attacker access to a user’s DJI account without the user being aware of it. CheckPoint research below explains how we were able to gain access to sensitive DJI drone flight information, as well as sensitive user data, across all three DJI platforms of Website, Mobile App and FlightHub.
2021_USA21_SBX1_XIL1_01_UAV_Security_Research_Series_Episode_5_MAVLink.pdf
2.2 MB
🛸Drone Security Research - Exploring MAVLink
Many commercial and recreational UAS systems use MAVLink to communicate instructions and data between the Ground Control Station and the drone. We explore the security aspects of this protocol and what it means for assessing threats, risks and mitigations for drone operators.
Many commercial and recreational UAS systems use MAVLink to communicate instructions and data between the Ground Control Station and the drone. We explore the security aspects of this protocol and what it means for assessing threats, risks and mitigations for drone operators.
🔥2
مهمان این هفته پادکست دارکنِت دایاریز خانم مَدی استون
کارشناس امنیت و از اعضای پروژه صفرشرکت گوکل بود. دراین اپیزود
موضوعات جالبی مثل نحوه شناسایی بدافزارهای اندروید، چگونگی مهندسی معکوس بدافزار های موجود و کشف آسیب پذیریهای روز صفر رو با مدی به بحث وگفتگو گذاشت. یکی از نکات جالب گفتگو مرور اجمالی نحوه کارکرد سیستم Google Play Protect بود که اخیرا نرم افزارروبیکا رو بدافزار تشخیص داد.
https://darknetdiaries.com/episode/127/
کارشناس امنیت و از اعضای پروژه صفرشرکت گوکل بود. دراین اپیزود
موضوعات جالبی مثل نحوه شناسایی بدافزارهای اندروید، چگونگی مهندسی معکوس بدافزار های موجود و کشف آسیب پذیریهای روز صفر رو با مدی به بحث وگفتگو گذاشت. یکی از نکات جالب گفتگو مرور اجمالی نحوه کارکرد سیستم Google Play Protect بود که اخیرا نرم افزار
https://darknetdiaries.com/episode/127/
👍3