Hacker Drones are Finally Here...

  Рет қаралды 198,569

Seytonic

Seytonic

Күн бұрын

Пікірлер: 727
@Seytonic
@Seytonic 2 жыл бұрын
Sorry if the audio feels a bit rushed on this one, I'm recovering from dental surgery atm so it's a bit difficult to speak. But I had to get this video out, the topics were too interesting :)))
@akarshanmishra2351
@akarshanmishra2351 2 жыл бұрын
Get well soon
@hadiassaddiab
@hadiassaddiab 2 жыл бұрын
Don't worry it's alright. Get well soon
@RiteshKumar-ph2zq
@RiteshKumar-ph2zq 2 жыл бұрын
apt get well soon 😊
@Watteni
@Watteni 2 жыл бұрын
ITS OK I LOVE YOU DADDY
@EthanCGamer
@EthanCGamer 2 жыл бұрын
It sounds fine to me, almost no difference.
@lukedev82
@lukedev82 2 жыл бұрын
An idea for the drone attack could be "Drone nesting" The drone will perch on a building and kind of make it its nest.
@CasperioSs
@CasperioSs 2 жыл бұрын
Especially if you you use multiple LOrA devices
@timah9420
@timah9420 2 жыл бұрын
How about "Roo(t)sting"?
@NahImPro
@NahImPro 2 жыл бұрын
This is it lol drone nesting
@BSJuliaMagna
@BSJuliaMagna 2 жыл бұрын
Yes please "drone nesting" sounds awesome
@thirtythreeeyes8624
@thirtythreeeyes8624 2 жыл бұрын
A smarter hacker would have just laid the egg and left.
@goranjosic
@goranjosic 2 жыл бұрын
Just one small thing, the Lora protocol definitely does not have a large enough bandwidth to transfer stolen data - Lora could be used to transfer user credentials, and for everything else a 4G module is necessary. I used Lora and for long distances the bandwidth is ridiculously small, just for transferring a few bytes per second.
@___echo___
@___echo___ 2 жыл бұрын
I was thinking, what about a directional wifi antenna stuck on top of the drone, dont those give pretty long range? Then you can point it at some router set up outside or something so your device can have wifi
@derrekvanee4567
@derrekvanee4567 2 жыл бұрын
Finally an arduino/stm32 nerd brotherein.
@NatiiixLP
@NatiiixLP 2 жыл бұрын
Then wouldn't the fastest solution use local storage and then just send the drone back? Ditching the drone on the roof of a corporate office building seems like a stupid move either way. You can store an arbitrary amount of data on fairly cheap storage that doesn't use a ton of power. You just have to get away before anyone notices you, but that's the case with pretty much any hack operation like this.
@theZ3r0CooL
@theZ3r0CooL 2 жыл бұрын
Lora would replace the modem for controlling the devices which would be performing the attacks from the attacked network over Wi-Fi after the first credentials were leaked then they could also find the data on other machines on the local network at that point which may have LAN connection and push the data up to the attackers backend even faster.
@SIRBOB102
@SIRBOB102 2 жыл бұрын
Lora for admin then stolen data physically on an sd card?
@leftyonthenet
@leftyonthenet 2 жыл бұрын
It'd be interesting how companies would have to send someone to the roof to check for hacker drones. Like, imagine going to the roof and finding a couple of drones with a bunch of hardware strapped to them.
@teknastyk
@teknastyk 2 жыл бұрын
scalp the hw and the drones.. yaay free stuff XD
@Reckless8
@Reckless8 2 жыл бұрын
I’ll do this for companies for a small fee but in exchange I get the stuff… plot twist: it’s me, I’m the hacker Nah jk lol
@davemeads859
@davemeads859 2 жыл бұрын
I guess you could use spikes (maybe electrified) like they use to stop birds landing on buildings or tangle wires like they have over prisons to stop helicopters and drones from landing
@TBloodFPV
@TBloodFPV 2 жыл бұрын
@@Reckless8 LMAO!!!!!!!!!!
@nugget3846
@nugget3846 2 жыл бұрын
everybody gangsta until they find a dron with a gun or taser strapped to it
@Ness_and_Sonic
@Ness_and_Sonic 2 жыл бұрын
I'd call that drone attack a "Pi in the Sky" attack or something similar.
@stocktonjoans
@stocktonjoans 2 жыл бұрын
Wi-fi-pi-spy-fly-by?
@finnandmick845
@finnandmick845 2 жыл бұрын
@@stocktonjoans NO LMAO.. lets stick with pi in the sky
@stocktonjoans
@stocktonjoans 2 жыл бұрын
@@finnandmick845 I'll get my coat
@anticom1337
@anticom1337 2 жыл бұрын
How about Skynapple attack?
@forceshieldjeff
@forceshieldjeff 2 жыл бұрын
I prefer calling my method the "pi with a huge external battery in a USPS flat rate envelope that drives by a target and all the other futures targets AND gets shipped home attack." Of course I mean that is what I would call it if I did do something like this.
@redderthanmisty6762
@redderthanmisty6762 2 жыл бұрын
For the drone case, I think a "Mosquito attack" would be a suitable name. The drone lands, siphons some data, and flies off again while also having the opportunity to leave some nasty viruses behind. Edit: Grammar
@sdani.
@sdani. 2 жыл бұрын
Such a good name
@Evegahana
@Evegahana 2 жыл бұрын
That’s actually a perfect name
@lelagrangeeffectphysics4120
@lelagrangeeffectphysics4120 2 жыл бұрын
how about Mossie the slang for mosquito fighters in PS2
@LostInTheRush
@LostInTheRush 2 жыл бұрын
That's it, guys! "Mosquito attack" officially coined!
@AlexSmith-jj9ul
@AlexSmith-jj9ul 2 жыл бұрын
Commenting to boost. Very good name.
@mirfieldman
@mirfieldman 2 жыл бұрын
Ironically I made SpiPi - a quadcopter with a Pi running Kali and (especially Aircrack :) ) - as a Uni project for my degree over a decade ago...surprised it took this long to be "discovered"
@vaisakh_km
@vaisakh_km 2 жыл бұрын
yes it's such a simple idea, and 90% cheaper and easy to execute than finding a 0day to exploit i am wondering why it hasn't been using... may be 4g modem can trace back to them??
@seal4080
@seal4080 2 жыл бұрын
This, i thought this was relatively known already
@HobkinBoi
@HobkinBoi 2 жыл бұрын
@@vaisakh_km I think one could get away with using a prepaid simcard, you can buy those in cash and you can probably register with some fake info or something.
@iraniansuperhacker4382
@iraniansuperhacker4382 2 жыл бұрын
@@vaisakh_km it probably is being used. Look at shellshock that shit was vulnerable for decades until it was officially found but I have a hard time believing it wasnt used before.
@jonhowells6271
@jonhowells6271 2 жыл бұрын
"Discovered" is Orwellian newspeak for somebody got caught. Dig deep enough and you will find hackers using stock RC planes 10+ years ago for sniffing networks. More up to date and closer to home in the UK there's been a couple of cases where Pirate radio operators have dropped transmitters onto tall but otherwise inaccessible roof tops.
@thacrypt223
@thacrypt223 2 жыл бұрын
Of course, these attacks are gonna get more sophisticated in the future. You told us all the ways to improve upon their flaws.
@8BitShadow
@8BitShadow 2 жыл бұрын
Mmm bird analogies would work well honestly. 'stalking' for when the drone/attacker is staying within the area *of the victim itself* and is trying to find a good place to 'nest' while also trying to find an attack vector. 'Nesting' for when the drone is staying within the area *where the victim frequently tends to be* (work building, home, some coffee shop) and, after a vector has been found, optionally, 'littering'. 'littering' for when the drone is setting up devices ('litters') that can run independently from the drone's power, probably making multiple trips to carry the tools to nest so that the attack can be carried out without risking the drone and thus making finding the culprit all the more difficult. As for the attack itself: 'swooping' So in this case it'd be a simple 'swooping' attack where the drone only 'nested' and didn't 'litter'. While if the drone *did* litter it would be a 'litter swooping' attack, as it'd be the litter carrying out the attack instead of the drone (so to speak).
@SaltyViper
@SaltyViper 2 жыл бұрын
This guy birds. Fantastic idea.
@SaltyViper
@SaltyViper 2 жыл бұрын
Some dude down there said Packet Perching
@mattstorm360
@mattstorm360 2 жыл бұрын
I like that. Just add Drone on the front and you are good. Drone Stalking Drone Nesting Drone Littering *What these attackers didn't do* Drone Swooping/Litter Swooping
@CrypticConsole
@CrypticConsole 2 жыл бұрын
I like the term "fly by" attack.
@comicmask8306
@comicmask8306 2 жыл бұрын
Drone attacks are going to revolve around remote connection to a device as if you were there, yet not. In that case, to make it hardware agnostic, the name of the attack should be a Poltergeist Attack, where you use a remote controlled malicious device to connect as if you were there. It doesn't just include drones, but can also include any device under your control you use remotely.
@An.Individual
@An.Individual 2 жыл бұрын
Great video. The Hacker Drone operators must have been close to the office to land on the roof.
@petemoss3160
@petemoss3160 2 жыл бұрын
with a 4G modem you could have a 3rd party assemble and release these anywhere.
@exposednl5559
@exposednl5559 2 жыл бұрын
some drones can fly km's
@HobkinBoi
@HobkinBoi 2 жыл бұрын
I don't think you'd have to do that, just launch a few blocks away or something, land on the roof, then you are already established. I think the main thing though is how long you can keep the drone on the roof before it's charge becomes too low to fly back. So i imagine they'd wanna launch pretty close by to have as much battery on board as possible left for them to hang there longer
@teddyruxpin3811
@teddyruxpin3811 2 жыл бұрын
The problem with using a Lora module is the bandwidth is so slow. And the range is line of sight. It's not often actually several kilometers. The 4g modem would have been much faster and allow the hackers to work from the comfort of their own homes.
@willstikken5619
@willstikken5619 2 жыл бұрын
It also adds a degree of traceability when discovered that you'll have to account for.
@goranjosic
@goranjosic 2 жыл бұрын
@@willstikken5619 yeah, definitely easier to follow Lora radio signal to source, then 4G
@willstikken5619
@willstikken5619 2 жыл бұрын
@@goranjosic I didn't propose Lora as a solution. I simply pointed out that, assuming they are using a paid service, there is an opsec risk to using a 4g service.
@Aci_yt
@Aci_yt 2 жыл бұрын
I think a simple name for attacks like this would be "Droning"
@Iplayforfood88
@Iplayforfood88 2 жыл бұрын
Ideally the drone didn't need to stay on the roof, they could have simply dropped a battery powered rig via the drone.
@geopoliticsjunkie4114
@geopoliticsjunkie4114 2 жыл бұрын
We did this with a Parrot drone in 2014 "Try and keep up " You seem like a blast from the past to me
@Mr3344555
@Mr3344555 2 жыл бұрын
Packet Perching - the act of using a drone to physically pen test a facility remotely
@Crysal
@Crysal 2 жыл бұрын
The drone attack where they just leave them on site, should be called a "Dive bomb attack"
@j3r0_plays7
@j3r0_plays7 2 жыл бұрын
Yes.
@stocktonjoans
@stocktonjoans 2 жыл бұрын
I dunno man, "Wi-fi-pi-spy-fly-by" has got a ring to it
@danielmiller8004
@danielmiller8004 2 жыл бұрын
Why not just WI-SPY then?
@adamfra64
@adamfra64 2 жыл бұрын
both of the above
@willstikken5619
@willstikken5619 2 жыл бұрын
That sounds more like a Kamakazi or Stuka attack depending on whether you plan to retrieve the gear or not.
@Nadesican
@Nadesican 2 жыл бұрын
Warflying. Also: Why the heck would you not strap a CAMERA or at the very least a motion sensor to the drone to detect humans? I can't imagine they wanted to lose those drones.
@HobkinBoi
@HobkinBoi 2 жыл бұрын
This is something I would've done, perhaps a script running on the pi to auto launch the drones off so you have a better chance of getting your equipment out automatically.
@vnc.t
@vnc.t 5 ай бұрын
the drones come with cameras, they tried to fly away but due to skill issue they crashed
@bayersbluebayoubioweapon8477
@bayersbluebayoubioweapon8477 2 жыл бұрын
This represents a serious security threat.
@marcopolo8584
@marcopolo8584 2 жыл бұрын
I wonder if businesses will be allowed to secure their airspace in the future.
@gocrazy1513
@gocrazy1513 2 жыл бұрын
@@neighbor472 rsk 4 life
@anthonyatienza3363
@anthonyatienza3363 2 жыл бұрын
I wanna call it "Proxy nodding" or "nodeing" because I had an idea on attached a drone with such devices and use them to set up proxy nodes to further boast signal, or create a small web. This idea was for LoRa or "Meshtastic" communication only. Probably be good for directly breaking into places that rely on electronic security via wifi.
@justgaming8867
@justgaming8867 2 жыл бұрын
my man this is absolutely beautiful. being an engineering student who's pretty interested in particle physics and nuclear power i am stoked to try this
@blubglub
@blubglub 2 жыл бұрын
If malware drones get popular enough, will we have to use physical anti-malware weapons? "Blow that piece of junk OUT OF THE SKY!"
@tokenfinnishguy8714
@tokenfinnishguy8714 2 жыл бұрын
"What you are seeing is advanced warfare!"
@manamsetty2664
@manamsetty2664 2 жыл бұрын
Drone hacker can be named Cuckoo attack because it's like laying it's trap right in the persons building
@Kalisthenics-rh5ce
@Kalisthenics-rh5ce 7 ай бұрын
Thanks Man! I love your informational viedeos and sometimes the info you give even helps me on projects and on.
@Matt47247523457
@Matt47247523457 2 жыл бұрын
there was "drive by" attacks, now there's "fly by" attack
@raphaelradespiel9970
@raphaelradespiel9970 2 жыл бұрын
I'm from 2056 and this attack is commonly called "droning"
@a6dulsalam511
@a6dulsalam511 Жыл бұрын
😂😂🤣
@spencerc4110
@spencerc4110 2 жыл бұрын
I've heard of drone attacks being called "Danger Drones" and "War flying"
@vaisakh_km
@vaisakh_km 2 жыл бұрын
okk now that's cool and doog< name
@ens0246
@ens0246 2 жыл бұрын
Skyhack sounds pretty cool. 'Nakatomi Plaza was subject to a skyhack"
@Adam-sw6iw
@Adam-sw6iw 2 жыл бұрын
The drone attack method should obviously be called CloudStrike.
@its_herocast276
@its_herocast276 2 жыл бұрын
drones were always "here", therefore the title should've been "Cyber Criminals Caught Hacking With Drones"
@desertdude540
@desertdude540 2 жыл бұрын
I'd suggest "fly on the ceiling attack".
@aria.z124
@aria.z124 2 жыл бұрын
3:52 seytonic making a "proof of consept" of this reminds me of the arduino rubber ducky he made.
@danielreed5199
@danielreed5199 2 жыл бұрын
Love your work man!
@Seytonic
@Seytonic 2 жыл бұрын
Thanks my dude : )
@allensmithphotography
@allensmithphotography 2 жыл бұрын
Automated aerial penetration vectors
@pikaa-si9ie
@pikaa-si9ie 2 жыл бұрын
Aapv👍
@alexosow
@alexosow 2 жыл бұрын
Dracking sounds like it could be a good name for drone hacking
@superguy7044
@superguy7044 2 жыл бұрын
the GPD was a redundancy backup for their man on the inside, he would probably have been expected to intercept the drone incase of crash or deployment failure, they could access the GPD to re-establish a connection with the primary controller manually. They must not have gotten a chance to get to the roof with an alibi and thus the drone was discovered before it was recovered
@derrekvanee4567
@derrekvanee4567 2 жыл бұрын
Dronenado 666! The dirty drunk Lahey craziest drone in the world, plus tornado.
@kellylynch8914
@kellylynch8914 2 жыл бұрын
Hacker drones have been in use for the last ten years now
@TheFlyingP1g
@TheFlyingP1g 2 жыл бұрын
WiFly attack?
@stocktonjoans
@stocktonjoans 2 жыл бұрын
Wi-fi-pi-spy-fly-by attack?
@urspufos
@urspufos 2 жыл бұрын
Yes, I like it! 😁
@Red-im5pb
@Red-im5pb 2 жыл бұрын
After seeing how it attacks I suggest maybe Arial Wireless Phishing (AWP). Aerial because it uses a flying drone to get near its target. Wireless because it is controlled remotely and uses a wireless access point to lure the victim. Phishing because it uses a fake login page to give the victim a false sense of security. Or maybe just simply Aerial Data Snooping (ADS) Pls pardon my knowladge if its confusing im just starting my networking journy and im still going through the basics XD
@danielmiller8004
@danielmiller8004 2 жыл бұрын
The drone attack can be called a wi-spy attack
@pekrulz1
@pekrulz1 2 жыл бұрын
It already has a name. "Warflying" is similar to the old wardriving. The early version of this was don with actual helicopters.
@LostInTheRush
@LostInTheRush 2 жыл бұрын
Warflying (or driving, walking etc.) is not inherently an attack. Flying around merely collecting WiFi data like SSIDs, channels, coordinates etc. can be considered warflying. It's recon.
@vaisakh_km
@vaisakh_km 2 жыл бұрын
that's totally different
@dahohi
@dahohi 2 жыл бұрын
Don't want to give anybody Ideas but if I had to do a pentest with a drone I would like you said use a smaller drone. But also, I wouldn't let the drone at the top of the building but rather use it as a transportation medium. Like carring a little box with power, lora, and a dev board to to what ever building you want. And if you are very fancy even a giro movement sensor that shorts the board if the box is moved.
@amb1u5
@amb1u5 2 жыл бұрын
i would use a bigger drone as smaller drone props are higher pitch and noise travels further, but yeah just rig it with a servo to disconnect the load, even ad a small solar panel if needed
@amb1u5
@amb1u5 2 жыл бұрын
@@llortaton2834 I don't get what you are saying, you must of misinterpreted what I said, I said I would use a drone with bigger propellers aka a bigger drone to haul the payload to the roof in which the load can be disconnected and the drone flown back to safety, I wouldn't call it a heavy load either when you'd really only need a raspberry pi or other pi or bone equivalent with a lora board and lipo or lipo bank and buck boost converters for the solar and the 5v dc
@chri-k
@chri-k 2 жыл бұрын
@@amb1u5 the problem is, if you are going to steal data, of which there is potentially gigabytes, LoRa is way too slow.
@amb1u5
@amb1u5 2 жыл бұрын
@@chri-k your not wrong there, you could probably set up a point to point 2.4 or 5ghz setup which would still be better than dropping a modem on the roof with a registered sim card
@chri-k
@chri-k 2 жыл бұрын
@@amb1u5 That doesn’t seem too efficient either, considering you would prefer to say undetected.
@oceanbytez847
@oceanbytez847 2 жыл бұрын
Wasp hack. It's a small flying drone that attacks often unprovolked and has a sting that can wound very deeply relative to it's size.
@oceanbytez847
@oceanbytez847 2 жыл бұрын
I think that the means in which the drone is used also matters. Wasp's would be any hack that is faciliated by a drone initially, but the drone is removed from the equation once the 'wasp' leaves after delivering the payload 'the venomous sting' and everything from thereon out can be done via the network or automation built into the malware like a virtual venom from the 'wasp'. A different name is needed for attacks that the drone remains a longterm factor.
@alainportant6412
@alainportant6412 2 жыл бұрын
😂😂 Not monitoring the Bicoin transaction for multiple confirmations before releasing the decryption key is what makes this hack so human and hilarious😂😂
@AhmedIbrahim-ye4po
@AhmedIbrahim-ye4po 2 жыл бұрын
Hi Seytonic , great insight. I totally agree that drone-hacking can be a mouthful. I sure they'll come up some more befitting but I can only think of drioning (even though it has multitude of meanings including drone, male bee for mating and parasite ) and drone-swipe.
@m4rt_
@m4rt_ 2 жыл бұрын
I kinda hoped you would mention the drone stuff happening in Norway.
@featherpony
@featherpony 2 жыл бұрын
That drone attack should be called a "Mosquito Attack". Just like a mosquito, it lands on its victim and bites and sits there.
@halo4life166
@halo4life166 2 жыл бұрын
Only thing I can think of is these new attacks being a sort of "drive by drone attack"
@plagefulbliss
@plagefulbliss 2 жыл бұрын
I'd like to suggest we use the term "Dracking" (Hacking through drones).
@funkepop
@funkepop 2 жыл бұрын
another guy suggested Drone Nesting, sounds a bit nicer
@rowon8249
@rowon8249 2 жыл бұрын
the reason they used mini laptop because it was the main device connected to company network where rpi just acted as 4lte gateway, so in practice they control rpi using reverse ssh then connect to min laptop , from laptop they connect to company network using wifi
@justhijs6954
@justhijs6954 Жыл бұрын
I would call this type of drone attack a Man-in-the-air attack.
@GhostPrivacy
@GhostPrivacy 2 жыл бұрын
This is obviously the opportune time to call it WAR-DRONING. Since it's so akin to war-driving. Who's with me!
@realroforb7676
@realroforb7676 2 жыл бұрын
You should call the drone attack a File UFO Attack.
@TheCreator1197
@TheCreator1197 2 жыл бұрын
Sky hack? Drop hack? Cuckoo’s nest? Someone else mentioned Drone Nesting which I quite like 😂
@ko-Daegu
@ko-Daegu 2 жыл бұрын
5:29 what about: 👉🏻Skyjack As a name From sky and hijack As they are hijacking’s your stuff (AP, internal IP…etc)
@KeithBoehler
@KeithBoehler 2 жыл бұрын
At what point would improving the hack drone also become identifying information. It feels like if it goes from script kiddie to professional then there are fewer people who can do it, and thus your identity might also be more exposed.
@Noobificado
@Noobificado 2 жыл бұрын
This sounds is kind of a DarkVishnya attack. May be call it Air Vishnya attack? Since the devices are not physically connected to a device on the network.
@AbdAbdAbdAbd
@AbdAbdAbdAbd 2 жыл бұрын
Droning would be a neat name. Past tense would be Droned of course.
@charleshines2142
@charleshines2142 Жыл бұрын
One other things that drones might do is they might be carrying devices on them to do a mousejack attack. This can also work on keyboards too. What they would do is inject keystrokes through vulnerable receivers for Bluetooth mice and keyboards. They might could make it appear that you typed a command to download and run a file. Such file would be malware that has some sort of nefarious purpose. It can be anything, they might steal your login passwords and user names, encrypt your files or even take control of your computer or all three. They might even make your computer a part of a bot net that does things like DDOS attacks even. They might install crypto miners on the computer too. They could do a variety of bad things if they ever got into your computer in any way. Not all wireless keyboards and mice are vulnerable to that attack but search before you buy if it is a concern to you. I know if I lived in a place where my computer would be closer to other rooms or apartment units I would be a little bit more concerned about it. The fact is where I am the nearest person is 300 feet away. Some WiFi routers don't have a strong enough signal to be picked up that far away or at least provide a stable connection from such a distance.
@jeroennederveen
@jeroennederveen 2 жыл бұрын
A name could be such a bird species that replace eggs from other birds with their own, like the Indigobird, Cowbird or Cuckoo. So, a Cuckoo hack maybe? Fly in, replace the eggs, and let the non-suspecting parents hatch the horror.
@potatony997
@potatony997 2 жыл бұрын
Droneware sounds like a fitting name
@crazyhairedcoder
@crazyhairedcoder 2 жыл бұрын
The drone attack should be called “SkyScraping” Pretty self explanatory 😂
@FreedomStateIOCM
@FreedomStateIOCM 4 ай бұрын
@4:56 Thanks for the ideas!
@FMHikari
@FMHikari 2 жыл бұрын
Scary. Imagine what a swarm can do.
@gerowen
@gerowen 2 жыл бұрын
You could call drone hacking "strafing", like a strafing run from air support, since like that, it's meant to fly in, do a job, and then leave.
@zachp97
@zachp97 2 жыл бұрын
The drone thing is interesting, maybe “Cuckoo Drone” or may just the generic “parasite drone”
@motulok8842
@motulok8842 2 жыл бұрын
This seems like a really crude setup as the entire thing could have been done way more covertly and cheaply. The biggest issue i have with their setup is the 4G modem. If the surrounding area has for example a parking lot, i would just use a shorter range transmitter that would transmit the data to some device in a parked car which could either have the 4G modem or just be checked once in a while. The whole thing could have easily been strapped to a way smaller drone and if they took some time, they could also design their own and fit the electronics inside so that it would look less suspicious. Overall a pretty bad execution on the hackers side.
@Scapestoat
@Scapestoat 2 жыл бұрын
Since it was such a botched together job, how about Bumblebee Attack? I love the little guys, but they're so bumbly!
@flannelsone1159
@flannelsone1159 2 жыл бұрын
We should call it an Ariel ambush attack
@curranhouse
@curranhouse 2 жыл бұрын
What about "Drone-Own" ? Bet the company was like thanks for free drones. The hackers by using a specialist drone also because of low volume of the expensive might be traceable via its serial number..
@overcheats4518
@overcheats4518 2 жыл бұрын
awesome as always Seytonic its a pleasure ❤
@differntname2807
@differntname2807 4 ай бұрын
Hacker drones should be called skynet attacks.
@westtexas806
@westtexas806 Жыл бұрын
I would disguise the pi and batteries as a vent or something. Then drop the payload on the roof and bring the drone home. A small piece of tin would allow you to pick up with a magnet to remove payload.
@annonymus2579
@annonymus2579 2 жыл бұрын
considering most attacks follow the same naming scheme, maybe "Dracking"
@trevorsmith5991
@trevorsmith5991 2 жыл бұрын
Worked , thanks a lot!
@Iloveallofyou1917
@Iloveallofyou1917 2 жыл бұрын
Best name would be a "pi in the sky" attack or for the really cool "sky-pi"
@antwarior
@antwarior 2 жыл бұрын
call the drone attacks "SKY FISHING" or "BLACK WING ATTACK"
@eldoprano
@eldoprano 2 жыл бұрын
I can imagine them thinking of buying a third drone and strapping it with a powerful GPU to "crack the hashes" xD
@hateeternalmaver
@hateeternalmaver 2 жыл бұрын
Yeah man, *Hacker Drone* ... I love the sound of that! ;D "I'll use my hacker drone" hehehe, that sounds awesome!
@torak456
@torak456 2 жыл бұрын
Depending on weight, a couple solar cells could extend the project (hack) lifetime. Better yet, if the hack goes unnoticed, but you have drained your batteries, over several days it may provide enough to recharge the drone just enough to perform a recovery.
@letsburn00
@letsburn00 2 жыл бұрын
This is my thought too. A solar panel or two and you'd be way ahead. It would allow you to load up your batteries during weekends.
@thegamer-gz5cr
@thegamer-gz5cr 2 жыл бұрын
I think we could call the drone attacks "Swarms", IDK
@YachtyBurner
@YachtyBurner 2 жыл бұрын
I say we call the hacker drones “Hones” since they hone in on the wifi network and since hacking also starts with an H and because well drones
@willstikken5619
@willstikken5619 2 жыл бұрын
Naming this will depend a lot on how the tactics actually evolve. If you're doing simple reconnaissance ala old school war driving it would seem straight forward to call it war droning or a war droid. If you plan to fly hardware to a facility like this and abandon it then it becomes a Kamakazi drone as its sacrificed in the attack. Personally, and depending on hardware I might go with something like a Cyber-Pi, Borg-Pineapple or just an IG-88 attack. These being translated as a Cybermen-esk RPi driven attack, a Borg-esk drone carrying a Wifi Pineapple or simply an assassin drone ala IG-88. We can’t presume that all drones used for this will be airborne. At the company I work for we did an experiment where we essentially built the mouse droid form star wars controlled by ardupilot and slapped a company logo on the side. With this we were able to tailgate through security and enter a facility full of security minded people and get little more than curious glances. A smaller version built with knowledge of our facility could have gotten through without drawing any attention. The larger version could have housed all of the hardware used here, essentially enter through the front door and carried out the same attack. By just making this look like one of our potential company projects we were able to get through a lot of doors that would have otherwise been closed. When we explained to leadership that we didn’t even really need to get through those doors they started to get the point.
@chri-k
@chri-k 2 жыл бұрын
i think it is much smarter to use the drone to drop a smaller payload, move the drone somewhere where you can pick it up later, and only then start doing something.
@willstikken5619
@willstikken5619 2 жыл бұрын
@@chri-k That was closer to our V2 concept but with a ground based drone since an aerial approach would have drawn attention from our existing security. All the drone has to do is get the payload close enough access the wifi while preferably staying unnoticeable.
@vaisakh_km
@vaisakh_km 2 жыл бұрын
wow, now that's a lot of name for same thing
@truerandomchannel
@truerandomchannel 2 жыл бұрын
someone suggested drone nesting and i think that fits most things
@SlyerFox666
@SlyerFox666 2 жыл бұрын
Well we had "drive by attacks" from cars so logically this is a "fly by attack"
@paulmcgowan8253
@paulmcgowan8253 2 жыл бұрын
For the drone attack I would call it a Fly n' Spy attack
@Omena0
@Omena0 2 жыл бұрын
"fly by attack" could be an attack where a drone flys over the building (or stays for a short time) and executes some exploit
@OnnieKoski
@OnnieKoski 2 жыл бұрын
They really should have released a small payload of hacking kit and then flown their drones out of there.
@Coldsteak
@Coldsteak 2 жыл бұрын
never have i seen something so cool, and so scary
@Jay-dh8iw
@Jay-dh8iw 2 жыл бұрын
It’s essentially wardriving but on a drone I’ve messed with it a bit using a rapi with wifi adapter on my DJI mini 2 and ssh into it with a mobile rig I have using a 10in monitor and a 2nd raspi in my car so I just called it war flying
@r0bo11
@r0bo11 2 жыл бұрын
Squidy -- like the flying squid hacker drones in the Matrix
@WaspLife
@WaspLife 2 жыл бұрын
lol we made Danger Drone at Bishop Fox a *long* time ago.
@x2_zoa141
@x2_zoa141 2 жыл бұрын
I think we should call it Airborne cyber intrusion drones (Or A.C.I.D)
@vigilante_stark
@vigilante_stark 2 жыл бұрын
Might as well add a camera to it so if anyone comes near the drone, it flies off.
@retro-neon-bacon-369
@retro-neon-bacon-369 2 жыл бұрын
Here's a suggestion for the drone name: "Air hacking" or "open-air hacking"
@hackr11007
@hackr11007 2 жыл бұрын
A "WiFi fly by" attack perhaps. Maybe even "WiFly" for short.
@th30519
@th30519 2 жыл бұрын
I'd call it a "Drone in the middle" attack.
@TheRealBobHickman
@TheRealBobHickman 2 жыл бұрын
We should call the attack Getting Dr0wned
Weaponized Tor is being Spread on YouTube
10:05
Seytonic
Рет қаралды 858 М.
DIY Drones: War Will Never be the Same
19:50
Johnny Harris
Рет қаралды 1,5 МЛН
СКОЛЬКО ПАЛЬЦЕВ ТУТ?
00:16
Masomka
Рет қаралды 3,1 МЛН
How Much Tape To Stop A Lamborghini?
00:15
MrBeast
Рет қаралды 202 МЛН
DevPortal Strategy webinar | 2024-10-29 | Pronovix
44:45
Pronovix Developer Portals
Рет қаралды 176
Flipper Zero Killers?  Devices Trying to Out Hack Flipper Zero!!
14:22
Talking Sasquach
Рет қаралды 27 М.
Exploiting Github to Mine Crypto
10:46
Seytonic
Рет қаралды 321 М.
RTX4090 is a Password Cracking BEAST
10:41
Seytonic
Рет қаралды 261 М.
FBI Seizes BreachForums! But Then Loses it...
8:09
Seytonic
Рет қаралды 163 М.
I Gave a Hacker 28 Days To Ruin My Life
21:37
Zac Alsop
Рет қаралды 3,3 МЛН
Hacking Drones With a Child's Toy
9:11
Michael Reeves
Рет қаралды 8 МЛН
Unknown Hacker Bricks 600,000 Routers
9:08
Seytonic
Рет қаралды 142 М.
The Hacking Empire Built on Discord
9:57
Seytonic
Рет қаралды 215 М.