0% found this document useful (0 votes)
52 views14 pages

Preview: Wireless Drone Vulnerabilities Assessment and Practical Exploitation: A Security Analysis

This thesis by Saja Alaedin Abozaideh assesses vulnerabilities in wireless drones, specifically focusing on the Snaptain A15H model. It explores various attack methods including Denial of Service and Man-in-the-Middle attacks, highlighting the risks associated with drone security in both military and civilian contexts. The research aims to inform ethical hackers about existing vulnerabilities and potential countermeasures to enhance drone security.

Uploaded by

peran1805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views14 pages

Preview: Wireless Drone Vulnerabilities Assessment and Practical Exploitation: A Security Analysis

This thesis by Saja Alaedin Abozaideh assesses vulnerabilities in wireless drones, specifically focusing on the Snaptain A15H model. It explores various attack methods including Denial of Service and Man-in-the-Middle attacks, highlighting the risks associated with drone security in both military and civilian contexts. The research aims to inform ethical hackers about existing vulnerabilities and potential countermeasures to enhance drone security.

Uploaded by

peran1805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Wireless Drone Vulnerabilities Assessment and Practical

Exploitation: A Security Analysis

W By
IE
Saja Alaedin Abozaideh
EV

Supervisor
Prof. Walid Salameh
PR

Thesis Submitted in Partial Fulfillment of the Requirements for the


Degree of Master of Science in Information Systems Security and Digital
Criminology

Princess Sumaya University for Technology


King Abdullah I School of Graduate Studies and Scientific Research

August 2023
Authorization Form

I, Saja Alaedin Abozaideh, authorize Princess Sumaya University for Technology to


supply copies of my [Link] thesis to libraries, establishments, or individuals on request,
according to the Regulations of Princess Sumaya University for Technology.

Signature: Saja Abozaideh

W
IE
EV

Date:14-5-2023
PR

i
Committee Decision
This thesis, “ Wireless Drone Vulnerabilities Assessment and Practical
Exploitation: A Security Analysis ” was Successfully Defended and
Approved on August 13, 2023.

Committee Members Signature


Prof. Walid Salameh, Supervisor

W
Professor of Computer Engineering ………………………
Princess Sumaya University for Technology
IE
Prof. Ashraf Ahmed, Member
EV

Professor of Computer Science and Engineering ………………………


Princess Sumaya University for Technology
PR

Prof. Jaafer Al-Saraireh, Member


Professor of Computer Science ………………………
Princess Sumaya University for Technology

Prof. Emad [Link], Member


Associate Professor of Information Security ………………………
The Hashemite University

ii
Dedication
This thesis is dedicated to my family, who have supported me throughout my academic
career. Their affection, encouragement, and unwavering support have been a limitless
source of motivation for me.
A distinct sense of gratitude to my always-by-my-side parents, Alaedin Abozaideh and
Salam Zakarneh. My sister Duha and my brothers Seraj and Deyaa, hold a special space
in my heart for their unending emotional support.

W
I also dedicate this work to my peers and mentors, who have encouraged me to strive for
IE
excellence and pursue my objectives. Their counsel, insights, and encouragement have
been priceless.
EV

This work is dedicated to the Princess Sumaya University of Technology professors


who enlightened and supported me throughout this process.
PR

Lastly, I dedicate this thesis to everyone affected by drone technology's security flaws
and dangers. May our efforts to enhance drone security and safety result in a safer future
for everyone.

Saja Alaedin Abozaideh

iii
Acknowledgments

I express my gratitude to Professor Walid Salameh, my supervisor, for his abundant


expertise and valuable time.

I express gratitude to my school division for permitting me to conduct this research and
for extending any necessary support.

Special appreciation to the King Abdullah I School of Graduate Studies and Scientific

W
Research staff members.
IE
Saja Alaedin Abozaideh
EV
PR

iv
List of Tables
Table 1.1: Possible Drone Attack .................................................................................... 9
Table 1.2: Drone Cyber Attacks. ................................................................................... 12
Table 1.3: Snaptain A15H Official Parameters. ............................................................ 21
Table 1.4: Raspberry-Pi 3 Official Parameters. ............................................................. 22
Table 1.5: The Alpha AWUS036ACH Official Parameters. ......................................... 23
Table 2.1: Related Work Summary.. ............................................................................. 29
Table 3.1: A Collection of Tools Employed to Gather Information and Gain Access. . 32
Table 3.2: Varieties of Attacks Conducted In This Research ........................................ 33

W
IE
EV
PR

v
List of Figures
Figure 1.1: The present analysis pertains to the evaluation conducted by the UK
Airprox board on a Small Unmanned Air System (SUAS). ............................................. 3
Figure 1.2: Controlling drones with GCS vs. direct control ............................................ 6
Figure 1.3: Combat Drone ............................................................................................... 6
Figure 1.4: Logistic Drone ............................................................................................... 7
Figure 1.5: A drone used for aerial photography. ............................................................ 7
Figure 1.6: The Reconnaissance Drone. .......................................................................... 8
Figure 1.7: Identity Spoofing. ........................................................................................ 14
Figure 1.8: MITM attack using Alpha Network Adapter AWUS036ACH. .................. 16
Figure 1.9: DoS Attack ................................................................................................. 19

W
Figure 1.10: Investigating the Snaptain a15h drone. .................................................... 20
Figure 1.11: The Raspberry-Pi 3 device. ...................................................................... 21
IE
Figure 1.12: The Alpha AWUS036ACH V.2. ............................................................... 23
Figure 3.1: Experiment configuration............................................................................ 33
Figure 4.1: Drone Attack Structure. .............................................................................. 35
EV

Figure 4.2: Results of a Drone-Based Nmap Network Scan. ........................................ 36


Figure 4.3: Results of a Drone used UDP ports............................................................. 36
Figure 4.4: the network latency using ping command. .................................................. 37
PR

Figure 4.5: the network latency using hping3 command. .............................................. 38


Figure 4.6: Effect of DoS Attack on Round-Trip Time in ms. ...................................... 38
Figure 4.7: Initiating the attack. ..................................................................................... 39
Figure 4.8: Captured Data Packets Displaying MAC Address Information and other
details .............................................................................................................................. 40
Figure 4.9: Remote Control detected ............................................................................. 40
Figure 4.10: Specify the correct channel. ...................................................................... 40
Figure 4.11: start sending deauthentication packet........................................................ 41
Figure 4.12: Analysing Deauthentication Packets with Wireshark. .............................. 41
Figure 4.13: A deauthentication attack on an Open wireless network. ......................... 42
Figure 4.14: Status of communication connection prior a DoS attack. ......................... 43
Figure 4.15: Status of communication connection following a DoS attack . ................ 43
Figure 4.16: A deauthentication attack on an Open wireless network. ......................... 44

vi
Figure 4.17: Python Script for gain unauthorized connection to the drone. .................. 45
Figure 4.18: successfully establish connection from attacking node ............................ 46
Figure 4.19: Video interception accomplished. ............................................................. 46

W
IE
EV
PR

vii
List of Abbreviations
ARP Address Resolution Protocol

BSSID Basic Service Set Identifier

CIA Confidentiality, Integrity, and Availability

DoS Denial of Service

FAA Federal Aviation Administration


FTP File Transfer Protocol

GPS

W
Global Positioning System
IE
GCS Ground Control Stations

HTTPS Hypertext Transfer Protocol Secure


EV

ICMP Internet Control Message Protocol


IoT Internet of Things
PR

IP Internet Protocol address

MITM Man In The Middle


MAC Media Access Control Address

NTPT Meanings

PoC Proof of Concept

SUAS Small Unmanned Aircraft System


SYN Synchronize
SSH Secure Shell

viii
TCP Transmission Control Protocol

UAV Unmanned Aerial Vehicles


UAS Unmanned Aircraft Systems
UCAV Unmanned Combat Aerial Vehicle
UDP User Datagram Protocol
USB Universal Serial Bus

Wi-Fi Wireless Fidelity

W
IE
EV
PR

ix
List of Contents

Authorization Form ......................................................................................................... i

Committee Decision ........................................................................................................ ii

Dedication ....................................................................................................................... iii

Acknowledgments .......................................................................................................... iv

List of Tables ................................................................................................................... v

List of Figures................................................................................................................. vi

List of Abbreviations ................................................................................................... viii

W
List of Contents ............................................................................................................... x

Abstract.......................................................................................................................... xii
IE
Chapter 1 Introduction ................................................................................................. 1

1.1 Overview ............................................................................................................ 1


EV

1.2 Background ........................................................................................................ 5

1.3 Security And Privacy In Drones ........................................................................ 9

1.4 Equipment for conducting a drone-hacking experiment .................................. 19


PR

Chapter 2 Problem Description ................................................................................. 25

1.5 Motivation ........................................................................................................ 25

1.6 Goal and objectives .......................................................................................... 26

1.7 Related work .................................................................................................... 27

1.8 Research Contribution ...................................................................................... 30

Chapter 3 Methodology .............................................................................................. 31

Chapter 4 Result and Discussion ................................................................................. 35

1.9 Reconnaissance and Scanning Exercise ........................................................... 35

1.10 Brute force attack ......................................................................................... 36

1.11 DoS Attack ................................................................................................... 37

x
1.12 Deauthentication Attack ............................................................................... 39

1.13 MITM Attack................................................................................................ 43

1.14 Drone Hijacking ........................................................................................... 45

1.15 Conclusion and Future Work........................................................................ 47

References ...................................................................................................................... 49

‫ الملخص‬............................................................................................................................... 53

W
IE
EV
PR

xi
Wireless Drone Vulnerabilities Assessment and Practical Exploitation:
A Security Analysis

By
Saja Alaedin Abozaideh

Supervisor
Prof. Walid Salameh

Abstract
The global utilization of drones has witnessed a substantial surge in recent times,
owing to the persistent rise in demand for their multifaceted applications. The prevalence
of these drones can be attributed to their ability to fulfill specified criteria. Drone
operators can now obtain an aerial perspective that can be utilized in virtually any location

W
and at any time.

Recently, there has been an increase in the utilization of drones by both


IE
conventional and cyber criminals for malevolent activities. This study outlines a practical
attack scenario wherein the authors have executed an actual attack on a Snaptain A15H
drone. The study delves into the current state of drone security and highlights a series of
vulnerabilities in Wi-Fi-enabled drones.
EV

The likelihood and occurrence rate of these attacks are considerably elevated, and
their ramifications can be exceedingly risky with sever consequences. The Snaptain
A15H underwent analysis to detect and implement six discrete types of attacks, along
with the potential for automated assault. This study examines various attacks, including
PR

Denial of Service, de-authentication Methods, Man-in-the-Middle, Unauthorized Root


Access, Packet Spoofing, and drone hijacking. Furthermore, the approach for each attack
was delineated, and the experimental section expounds upon the outcomes and
methodologies employed in executing said attacks.

The present investigation also examines the security state of unmanned aerial
vehicles. This research aims to examine the possible risks associated with using drones
in cyberattacks and the countermeasures that can be employed to mitigate such threats.
This helps ethical hackers understand the comprehension of existing vulnerabilities in
unmanned aerial vehicles (UAVs) within military and civilian domains. Furthermore, it
empowers them to customize and innovate novel techniques and technologies to enhance
the defense and detection of unmanned aerial vehicle (UAV) attacks.

Keywords: Snaptain A15H, Drone, Man-In-The-Middle, Denial-of-Service, Attack,


Hijack, AWUS036ACH.

xii
Chapter 1
Introduction
The number of lightweight unmanned aerial vehicles (UAVs) is predicted to rise
enormously, and many of them currently use an insecure command and control protocol.
A variety of miniature unmanned aircraft is controlled and managed using smartphones
through wireless. This research will analyze different exploits that endanger the integrity,
confidentiality, and accessibility of information (CIA) of data where the unmanned aerial
vehicles transmit it over the wireless to ground control stations.

The introductory chapter presents a comprehensive outline of unmanned aerial


vehicles, their diverse classifications, and their modes of operation. It also addresses the

W
issues of security and privacy in wireless drones, the various hardware tools utilized in
the experiment and their specifications.
IE
1.1 Overview
Unmanned aerial systems (UAS), formerly solely utilized by the military, are
EV

gaining popularity across industries and becoming increasingly common in commercial


and non-commercial areas [1]. it has various potential applications in the future, such as
safeguarding borders, assisting coastguards, tackling forest fires, conducting emergency
PR

rescues, aiding the oil industry, monitoring the environment, and taking aerial
photographs [2]. Drones, or unmanned aerial vehicles (UAV), are unpiloted aircraft
controlled by an onboard computer or remote control [3]. As drone usage continues to
expand, they become an increasingly attractive target for attackers. McAfee Labs
recognized "Drone Jacking" as an important emerging threat in its 2017 Threats
Predictions Report. UAVs that can store multiple forms of private information, such as
photographs, videos, and GPS positions, are an attractive target for numerous categories
of hackers. With the likelihood of surveillance drones rising in today's society, it is vital
to protect sensitive information from falling into the wrong hands[4].

UAVs are being integrated into the Internet of Things (IoT). With their flexible
mobility, speed of response, high maneuverability, and simplicity of assembly, UAVs

Reproduced with permission of copyright owner. Further reproduction prohibited without permission.

You might also like