
Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi Pineapple
Author(s) -
J. Caroline El Fiorenza,
Revanth Kumar Lokku,
K Sivakumar,
M Reene Stephanie
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.a4684.119119
Subject(s) - drone , computer security , hacker , spoofing attack , computer science , exploit , internet privacy , biology , genetics
The utilization of Internet-of-Things (IoT) innovation is developing exponentially as more shoppers and organizations recognize the benefits offered by the savvy and shrewd gadgets. The major purpose of this paper arose due to the reason that since drone innovation is a quickly rising segment inside the IoT and the danger of hacking couldn't just purpose an information break, it could likewise represent a noteworthy hazard to the open well-being. On account of their flexible applications and access to ongoing data, commercial drones are used across a wide variety of smart city applications. However, with many IoT devices, security is frequently an untimely idea, leaving numerous drones helpless against programmers. What is being done in this paper is that this paper examines the present condition of automation security and exhibits a lot of Wi-Fi empowered drone vulnerabilities. Five distinct sorts of assaults, together with the capability of robotization of assaults, were identified and connected to two unique kinds of scientifically accessible drones. For the execution, the methodologies and techniques used are the correspondence connections that are researched for the assaults, for example Disavowal of Service, De-authentication Methods, Man-in-the-Middle, Unauthorized Root Access and Packet Spoofing. Ultimately, the unapproved root access was computerized using a Raspberry-Pi 3 and Wi-Fi Pineapple. Besides, the strategy for each assault is laid out, also the test part diagrams the findings and procedures of the assaults. The Basic Intrusion Detection Systems and Intrusion Protection System so as to avoid the UAV (unmanned aerial vehicles) from entering the confined airspace are discussed. At long last, the paper tends to the present condition of automaton security, the executives, control, flexibility, protection concerns by using GPS spoofing as a method to secure the target which is the drone from being vulnerable to the attacker.