Difference between revisions of "Parrot Bebop"
Jump to navigation
Jump to search
m (→Officials) |
m (→Security) |
||
Line 34: | Line 34: | ||
=Security= |
=Security= |
||
+ | ==Too easy to crash== |
||
http://securityaffairs.co/wordpress/39363/hacking/hacking-parrot-drones.html |
http://securityaffairs.co/wordpress/39363/hacking/hacking-parrot-drones.html |
||
Line 39: | Line 40: | ||
ps | grep dragon |
ps | grep dragon |
||
kill -9 ### |
kill -9 ### |
||
− | Hmm, need to setup WEP or WPA-PSK, manually over Wi-Fi |
||
+ | Actually there is even quicker: |
||
− | Example for WEP: |
||
+ | telnet 192.168.42.1 |
||
+ | kk |
||
+ | |||
+ | ==WEP?== |
||
+ | Apparently possible to setup WEP, or even WPA? |
||
bcmwl addwep 0 1234567890 |
bcmwl addwep 0 1234567890 |
||
bcmwl wsec 1 |
bcmwl wsec 1 |
||
Line 52: | Line 57: | ||
bcmwl addwep 0 1234567890 |
bcmwl addwep 0 1234567890 |
||
bcmwl wsec 1 |
bcmwl wsec 1 |
||
+ | |||
+ | Problem is that it may impact link quality and anyway it's incompatible with a SkyController... |
||
+ | |||
+ | ==telnet password== |
||
+ | That's the minimum we can do: |
||
+ | |||
+ | telnet 192.168.42.1 |
||
+ | # choose a new password |
||
+ | passwd |
||
+ | # fix bug in /etc/passwd (trailing spaces after /bin/sh) |
||
+ | sed -i 's/ *$//' /etc/passwd |
||
+ | # redirect root home to /home (where there is already a .bashrc) |
||
+ | sed -i 's#/home/root#/home#' /etc/passwd |
||
+ | # redirect telnet login to /bin/login |
||
+ | sed -i 's/sh -l/login/' /bin/login.sh |
||
+ | # reboot |
||
+ | /bin/ardrone3_shutdown.sh |
||
+ | |||
=Tools= |
=Tools= |
||
* https://github.com/Zepheus/ardrone3-pcap sniffing protocol |
* https://github.com/Zepheus/ardrone3-pcap sniffing protocol |
Revision as of 23:55, 16 October 2015
Weight
Bebop 275g bat 1200 117g bat 1600 135g bat 2500 189g hull/carene 24g cache-cam 6g
Links
Officials
ARDroneSDK 3
- http://blog.parrot.com/2014/11/28/ardronesdk3-for-bebop-drone-and-minidrones-has-been-released/
- https://github.com/Parrot-Developers/ARSDKBuildUtils
- https://github.com/Parrot-Developers/Samples
- https://github.com/Parrot-Developers/bybop in python
Community
- http://www.bebopdrone.org/
- http://forum.parrot.com/usa/viewtopic.php?id=29088
- http://bebob.wikia.com/wiki/Bebob_Community_Drone_Hacking_Wiki
Hacks
- https://github.com/matthewlloyd/bebop Code repo disappeared but clones here:
- http://robotika.cz/robots/katarina/en
- https://github.com/hybridgroup/node-bebop control in node.js
Paparazzi
- http://wiki.paparazziuav.org/wiki/Main_Page
- http://wiki.paparazziuav.org/wiki/Bebop
- https://github.com/paparazzi/paparazzi
- https://github.com/paparazzi/paparazzi/tree/master/sw/airborne/boards/bebop
Security
Too easy to crash
http://securityaffairs.co/wordpress/39363/hacking/hacking-parrot-drones.html
telnet 192.168.42.1 ps | grep dragon kill -9 ###
Actually there is even quicker:
telnet 192.168.42.1 kk
WEP?
Apparently possible to setup WEP, or even WPA?
bcmwl addwep 0 1234567890 bcmwl wsec 1
Permanent (! reset wouldn't clean it, maybe flashing from USB?)
vi /sbin/broadcom_setup.sh At the end of the create_access_point Before the print out of success add the two lines: ------------- bcmwl addwep 0 1234567890 bcmwl wsec 1
Problem is that it may impact link quality and anyway it's incompatible with a SkyController...
telnet password
That's the minimum we can do:
telnet 192.168.42.1 # choose a new password passwd # fix bug in /etc/passwd (trailing spaces after /bin/sh) sed -i 's/ *$//' /etc/passwd # redirect root home to /home (where there is already a .bashrc) sed -i 's#/home/root#/home#' /etc/passwd # redirect telnet login to /bin/login sed -i 's/sh -l/login/' /bin/login.sh # reboot /bin/ardrone3_shutdown.sh
Tools
- https://github.com/Zepheus/ardrone3-pcap sniffing protocol