Practical Drone Hacking – Zero to Hero

$3,299.00

Duration

3 days

Delivery Method

in-person

Level

beginner / intermediate

Seats Available

20

Duration

3 days

Delivery Method

in-person

Level

beginner / intermediate

ATTEND IN-PERSON: Onsite in Bangkok, Thailand

DATE: 26-28 August 2024

TIME: 09:00 to 17:00 ICT/GMT+7

Date Day Time Duration
26 Aug Monday 0900-17:00 ICT/GMT+7 8 Hours
27 Aug Tuesday 0900-17:00 ICT/GMT+7 8 Hours
28 Aug Wednesday 0900-17:00 ICT/GMT+7 8 Hours

Equipment take away (worth USD300)
– A programable quadcopter drone
– A programable remote controller
– A portable signal generator
– A USB wireless dongle

Advancements in UAV technology is opening new opportunities and applications in various fields of life. However, these advancements are also causing new challenges in terms of security, adaptability, and consistency. Especially the small drones are even suffering from architectural issues and the defini0on of security and safety issues. In this course, a programable small drone will be provided to learn the common drone aPack vectors and hacking skills.

In this course we will introduce security risk and design considerations in designing and implementing drone systems as well as operating drones in a safe and secure way. The course covers technical details from hardware to soQware, from aPack to defense related to drone security. Participants will get first-hand experience in aPacking drones via hardware RF jammer, SDR and software programming. At the same 0me, participants will attempt to design their own secure drone control system architecture, implement their own drone control protocols via embedded and client programming supported by open programming platform with commodity hardware.

 

Topics Covered

Introduction

  • Background
  • Regulatory warning
  • Safety
  • Ethical
  • Risks Caveat/Disclaimer Requirements

 

Attack Vectors

  • Introduce the common methods for drone hacking from internal to external: Firmware, Application and Communication
  • Reverse engineering of software components and protocol analysis
  • WiFi attack and BLE sniffing / testing
  •  Race condition with application command protocol and low level BLE / UDP protocol – Man-in-the-Middle threat associated with architecture design of software framework to orchestrate operator control

 

Software Implementation

  • Introduce the application and software involved in drone hacking – Drone client control programming
  • Drone embedded programming with MicroPython on ESP32
  • Custom application control protocol implementation over BLE / UDP/TCP/HTTP

 

Drone Architecture

  • Learn basic drone operation
  • Build a programmable small drone
  • Program the drone and remote controller – Drone components

 

Drone Signal

  • Radio Frequency
  • Wireless Connections
  • Video Transmissions
  • Protocols

 

Signal Spoofing and Genera0on (Jammer)

  • Software: Use application to identify the drone signal.
  • Hardware: Use SDR devices with the application to generate the signal and understand the concept
  • Illustrate how to build the device step-by-step
  • Shoot the Drone

 

It is an unique and never launches in the market. The course focus on the whole architecture of drone with its aPack potential from internal to external, including kernel, applications, and signal communication.

Why You Should Take This Course

It is an unique and never launches in the market.  The course focus on the whole architecture of drone with its attack potential from internal to external, including kernel, application and signal communication.

Who Should Attend

Cyber Security Professionals (e.g. Pentesters, Red Teamers)
  • Wireless Radio & RF/SDR enthusiast
  • Drone pilots & hobbyists
  • Physical security staff
  • Electronic Warfare (EW) and Signal Security

Key Learning Objectives

  • Software Implementa0on

  • Drone Operation

  • Drone Signal Hacking

  • Flight Control / Firmware

  • Jammer
  • Prerequisite Knowledge

    Basic Knowledge of (but not limited to)
    • Small Drone Opera0on
    • Embedded System
    • RF and Wireless technology
    • Programming experience preferably in Python and/or C/C++/C#
    • Knowledge in TCP/IP, UDP, and BLE protocols

    Hardware / Software Requirements

    TBA

    Your Instructor

    Cato Yuen is a drone pilot with over 10 years of experience, he has been building his own multirotor drones and providing unmanned aerial services to local government and corporations.

    He founded Flysmart Digi in **2015**, bringing multirotor components to individuals, works with various manufacturers in product development and testing for upcoming multirotor technologies. In recent years Cato also organizes events with local schools and organizations to provide training and experience opportunities for interested parties.

    Sky Yeung aka DNTSky is the chairman of DNT FPV Drone Association Hong Kong, China.  He is also:

    – Speaker of Black Hat MEA 2023

    – ⁠Specialist on drone education and tech development with both defensive and offensive security

    – ⁠Delivered speeches in over 150+ primary, secondary and ngo education system in Hong Kong

    – ⁠STEM consultant of 16+ countries under organization from in South Korea IDSC.  

    – ⁠Drone Pilot Trainer and Accessor in Hong Kong and China ASFC Jude

    – ⁠Organizer of Tier 1 Chapter in Asia of MultiGP International Race

    Captain (a.k.a. Forensics and Hardware Ninja) is an independent security researcher. He focuses on hardware, UAS (Drone) security researches, and digital forensics analysis. He was the first and the only Asian who led a group of white-hat hackers to hold an in-depth, hands-on drone and hardware hacking village in BLACK HAT and DEFCON. He was also a frequent speaker and trainer in different top-notch security and forensics conferences including SANS, HTCIA, DFRWS, GCC, CodeBlue, HITB, SINCON, AVTokyo and HITCON.