Practical Drone Hacking – Zero to Hero



3 days

Delivery Method



beginner / intermediate

Seats Available



3 days

Delivery Method



beginner / intermediate

ATTEND IN-PERSON: Onsite in Bangkok, Thailand

DATE: 26-28 August 2024

TIME: 09:00 to 17:00 ICT/GMT+7

Date Day Time Duration
26 Aug Monday 0900-17:00 ICT/GMT+7 8 Hours
27 Aug Tuesday 0900-17:00 ICT/GMT+7 8 Hours
28 Aug Wednesday 0900-17:00 ICT/GMT+7 8 Hours

Equipment take away (worth USD300)
– A programable quadcopter drone
– A programable remote controller
– A portable signal generator
– A USB wireless dongle

Advancements in UAV technology is opening new opportunities and applications in various fields of life. However, these advancements are also causing new challenges in terms of security, adaptability, and consistency. Especially the small drones are even suffering from architectural issues and the definition of security and safety issues.

In this couse, we will introduce security risk and design considerations in designing and implementing drone systems as well as operating drones in a safe and secure way. It covers technical details from hardware to software, from attack to defense related to drone security.  Participants will get first-hand experience in attacking drones via hardware disassembly, signaling, software programming, forensics.  At the same time, participants will attempt to design their own secure drone control system architecture, implement their own drone control protocols via embedded and client programming supported by open programming platform with commodity hardware.


Topics Covered
  • Background
  • Regulatory warning
  • Safety
  • Ethical
  • Risks Caveat/Disclaimer Requirements


Attack Vectors
  • Introduce the common methods for drone hacking from internal to external: Firmware, Application and Communication
  • Reverse engineering of software components and protocol analysis
  • WiFi attack and BLE sniffing / testing
  • Race condition with application command protocol and low level BLE / UDP protocol
  • Man-in-the-Middle threat associated with architecture design of software framework to orchestrate operator control


Software Implementation
  • Introduce the application and software involved in drone hacking
  • Drone client control programming
  • Drone embedded programming with MicroPython on ESP32
  • Custom application control protocol implementation over BLE / UDP


Drone Forensics
  • Data and Log Analysis
  • BetaFlight Configurator
  • Blackbox Log Viewer/Explorer
  • CLI/Blackbox Analysis
  • In-depth Chip-Off Analysis


Drone Architecture
  • Learn basic drone operation
  • Build a programable small drone
  • Program the drone and remote controller


Drone Signal
  • Radio Frequency
  • Wireless Connection
  • Video Transimission
  • Protocol


Signal Spoofing and Generation
  • Software: Use application to identify the drone signal.
  • Hardware: Use SDR devices with the application to generate the signal and understand the concept
  • Illustrate how to build the device step-by-step


Shoot the Drone

It is an unique and never launches in the market. The course focus on the whole architecture of drone with its attack potential from internal to external, including kernel, application and signal communication.


Why You Should Take This Course

In this unique UAV training, partcipants will focus on the whole architecture of the drone with its various attack potential from internal to external, including kernel, application and signal communication.
This 3-day course then lets participants design their own drone control system and helps them implement these protocols in a secure way. Participants get to take home US$300 worth of gear including their own programmable quadcopter drone, controller, signal generator, and wireless dongle.

Who Should Attend

Cyber Security Professionals (e.g. Pentesters, Red Teamers)
  • Wireless Radio & RF/SDR enthusiast
  • Drone pilots & hobbyists
  • Physical security staff
  • Electronic Warfare (EW) and Signal Security

Key Learning Objectives

  • Software Implementa0on

  • Drone Operation

  • Drone Signal Hacking

  • Flight Control / Firmware

  • Jammer
  • Prerequisite Knowledge

    Basic Knowledge of (but not limited to)
    • Small Drone Opera0on
    • Embedded System
    • RF and Wireless technology
    • Programming experience preferably in Python and/or C/C++/C#
    • Knowledge in TCP/IP, UDP, and BLE protocols

    Hardware / Software Requirements

    • A programable quadcopter drone
    • A programable remote controller
    • A portable signal generator
    • A USB wireless dongle
    • SDR devices
    • UAS flight control board

    Your Instructor

    Janet is an Ag. Lecturer of Hong Kong Institute of Vocational Education (Chai Wan), mainstream Cybersecurity to deliver networking, system administration, and cybersecurity knowledge, supervise the Final Year Projects of Higher Diploma in Cybersecurity, including developing a cybersecurity lab by using GNS3 for building the network and IDS Security Onion for analysing malicious traffics, developing the web interfaces for integrated penetration tools, and experienced in Cyberbit platform, a renowned cybersecurity training and simulation solution, with hands-on training scenarios simulating a variety of cyber-attacks, gaining practical knowledge of threat detection, incident response, and vulnerability management.

    Cato Yuen is a drone pilot with over 10 years of experience, he has been building his own multirotor drones and providing unmanned aerial services to local government and corporations.

    He founded Flysmart Digi in **2015**, bringing multirotor components to individuals, works with various manufacturers in product development and testing for upcoming multirotor technologies. In recent years Cato also organizes events with local schools and organizations to provide training and experience opportunities for interested parties.

    Sky Yeung aka DNTSky is the chairman of DNT FPV Drone Association Hong Kong, China.  He is also:

    – Speaker of Black Hat MEA 2023
    – ⁠Specialist on drone education and tech development with both defensive and offensive security
    – ⁠Delivered speeches in over 150+ primary, secondary and ngo education system in Hong Kong
    – ⁠STEM consultant of 16+ countries under organization from in South Korea IDSC.  
    – ⁠Drone Pilot Trainer and Accessor in Hong Kong and China ASFC Jude
    – ⁠Organizer of Tier 1 Chapter in Asia of MultiGP International Race

    Alan has ample experience handling complex dispute and litigation cases, having served as forensic examiner, e-discovery specialist, and expert witness testified before courts of laws, at multiple top-tier multinational forensic firms.

    As an digital forensics and incident response expert Alan is well respected for his deep understanding of technologies, acquired through years of diverse background in network & infrastructure security, IT audit & penetration testing, and security solution architecture & design, across nearly two decades of deeply technical engagements.

    He has presented at PacSec Tokyo (2013), DEFCON (2012), and HTCIA Asia-Pacific Conference (2012). Alan is a holder of CFE, OSCE3 (OSEP, OSWE, OSED), OSCP, OSDA, OSWA, EnCE, CISA, and GREM.