2024-12-14 –, Rookie track 2
In this session, I will present my research on disrupting drone operations by targeting their command-and-control (C2) channels and analyzing the forensic evidence left behind. My work explores various disruption techniques, such as Wi-Fi de-authentication, man-in-the-middle (MITM) attacks, video stealing, and drone disabling using tools like Flipper Zero, ESP32 microcontrollers, and Linux command-line utilities. I will also delve into the forensic analysis conducted post-attack to identify digital footprints and network anomalies left by these disruptions. If live demonstrations are not feasible at the conference, I have recorded videos of all the attacks on the drone to showcase them, and some of the attacks can be performed without flying the drone. Alternatively, I can use simulations to demonstrate the techniques. This research provides a framework for detecting and documenting evidence of drone attacks, significantly contributing to the field of drone forensics and cyber-physical security.
Drones have become a crucial part of modern technology, playing vital roles in both civilian and military operations. However, their increasing use also exposes them to various cyber threats, particularly those targeting their command-and-control (C2) channels. In my talk, I will demonstrate practical methodologies developed to disrupt drone systems, using tools such as Flipper Zero, ESP32 microcontrollers, and Aircrack-ng to simulate real-world attacks. I will detail various attack scenarios, including a video stealing attack that intercepts and records drone video feeds, and a drone disabling attack that remotely powers off the drone, rendering it inoperable. Post-attack, I conducted comprehensive forensic analyses to capture network traffic and digital footprints, revealing critical evidence of the disruptions. This talk aims to raise awareness of drone vulnerabilities, present forensic strategies for evidence gathering, and foster the development of effective countermeasures against these threats.
Yes
Hello, this is Paavai Aram. I am currently pursuing MSc in Cybersecurity Engineering at the University of Warwick. My inception into Cybersecurity began with my inspiration of Richard Stallman and free open source software tools. I even built a Linux-themed website (https://killswitchp.github.io/) from scratch where I write cybersecurity and personal blogs. Apart from this, I like Active Directory penetration testing and Threat Hunting. Soon I will be doing some advanced red team certifications as well :)