Hacker Drones are Finally Here...

  Рет қаралды 197,407

Seytonic

Seytonic

Күн бұрын

$5 Free Credit 👉 PCBWay pcbway.com/g/g...
0:00 Intro
0:13 Hackers are Using Drones…
5:36 Police Trick Ransomware Gang
8:57 PCBWay
9:36 Outro
Sources:
go.theregister...
www.darkreadin...
/ 1579550302172508161
www.bleepingco...
www.politie.nl...
support.bitso....
nakedsecurity....
===============================================
My Website: www.seytonic.com/
Follow me on TWTR: / seytonic
Follow me on INSTA: / jhonti
===============================================

Пікірлер: 735
@Seytonic
@Seytonic Жыл бұрын
Sorry if the audio feels a bit rushed on this one, I'm recovering from dental surgery atm so it's a bit difficult to speak. But I had to get this video out, the topics were too interesting :)))
@akarshanmishra2351
@akarshanmishra2351 Жыл бұрын
Get well soon
@hadiassaddiab
@hadiassaddiab Жыл бұрын
Don't worry it's alright. Get well soon
@RiteshKumar-ph2zq
@RiteshKumar-ph2zq Жыл бұрын
apt get well soon 😊
@Watteni
@Watteni Жыл бұрын
ITS OK I LOVE YOU DADDY
@EthanCGamer
@EthanCGamer Жыл бұрын
It sounds fine to me, almost no difference.
@lukedev82
@lukedev82 Жыл бұрын
An idea for the drone attack could be "Drone nesting" The drone will perch on a building and kind of make it its nest.
@CasperioSs
@CasperioSs Жыл бұрын
Especially if you you use multiple LOrA devices
@timah9420
@timah9420 Жыл бұрын
How about "Roo(t)sting"?
@NahImPro
@NahImPro Жыл бұрын
This is it lol drone nesting
@BSJuliaMagna
@BSJuliaMagna Жыл бұрын
Yes please "drone nesting" sounds awesome
@thirtythreeeyes8624
@thirtythreeeyes8624 Жыл бұрын
A smarter hacker would have just laid the egg and left.
@Ness_and_Sonic
@Ness_and_Sonic Жыл бұрын
I'd call that drone attack a "Pi in the Sky" attack or something similar.
@stocktonjoans
@stocktonjoans Жыл бұрын
Wi-fi-pi-spy-fly-by?
@finnandmick845
@finnandmick845 Жыл бұрын
@@stocktonjoans NO LMAO.. lets stick with pi in the sky
@stocktonjoans
@stocktonjoans Жыл бұрын
@@finnandmick845 I'll get my coat
@anticom1337
@anticom1337 Жыл бұрын
How about Skynapple attack?
@forceshieldjeff
@forceshieldjeff Жыл бұрын
I prefer calling my method the "pi with a huge external battery in a USPS flat rate envelope that drives by a target and all the other futures targets AND gets shipped home attack." Of course I mean that is what I would call it if I did do something like this.
@redderthanmisty6762
@redderthanmisty6762 Жыл бұрын
For the drone case, I think a "Mosquito attack" would be a suitable name. The drone lands, siphons some data, and flies off again while also having the opportunity to leave some nasty viruses behind. Edit: Grammar
@sdani.
@sdani. Жыл бұрын
Such a good name
@Evegahana
@Evegahana Жыл бұрын
That’s actually a perfect name
@lelagrangeeffectphysics4120
@lelagrangeeffectphysics4120 Жыл бұрын
how about Mossie the slang for mosquito fighters in PS2
@LostInTheRush
@LostInTheRush Жыл бұрын
That's it, guys! "Mosquito attack" officially coined!
@AlexSmith-jj9ul
@AlexSmith-jj9ul Жыл бұрын
Commenting to boost. Very good name.
@goranjosic
@goranjosic Жыл бұрын
Just one small thing, the Lora protocol definitely does not have a large enough bandwidth to transfer stolen data - Lora could be used to transfer user credentials, and for everything else a 4G module is necessary. I used Lora and for long distances the bandwidth is ridiculously small, just for transferring a few bytes per second.
@___echo___
@___echo___ Жыл бұрын
I was thinking, what about a directional wifi antenna stuck on top of the drone, dont those give pretty long range? Then you can point it at some router set up outside or something so your device can have wifi
@derrekvanee4567
@derrekvanee4567 Жыл бұрын
Finally an arduino/stm32 nerd brotherein.
@NatiiixLP
@NatiiixLP Жыл бұрын
Then wouldn't the fastest solution use local storage and then just send the drone back? Ditching the drone on the roof of a corporate office building seems like a stupid move either way. You can store an arbitrary amount of data on fairly cheap storage that doesn't use a ton of power. You just have to get away before anyone notices you, but that's the case with pretty much any hack operation like this.
@theZ3r0CooL
@theZ3r0CooL Жыл бұрын
Lora would replace the modem for controlling the devices which would be performing the attacks from the attacked network over Wi-Fi after the first credentials were leaked then they could also find the data on other machines on the local network at that point which may have LAN connection and push the data up to the attackers backend even faster.
@SIRBOB102
@SIRBOB102 Жыл бұрын
Lora for admin then stolen data physically on an sd card?
@leftyonthenet
@leftyonthenet Жыл бұрын
It'd be interesting how companies would have to send someone to the roof to check for hacker drones. Like, imagine going to the roof and finding a couple of drones with a bunch of hardware strapped to them.
@teknastyk
@teknastyk Жыл бұрын
scalp the hw and the drones.. yaay free stuff XD
@scarface3935
@scarface3935 Жыл бұрын
I’ll do this for companies for a small fee but in exchange I get the stuff… plot twist: it’s me, I’m the hacker Nah jk lol
@davemeads859
@davemeads859 Жыл бұрын
I guess you could use spikes (maybe electrified) like they use to stop birds landing on buildings or tangle wires like they have over prisons to stop helicopters and drones from landing
@TBloodFPV
@TBloodFPV Жыл бұрын
@@scarface3935 LMAO!!!!!!!!!!
@nugget3846
@nugget3846 Жыл бұрын
everybody gangsta until they find a dron with a gun or taser strapped to it
@mirfieldman
@mirfieldman Жыл бұрын
Ironically I made SpiPi - a quadcopter with a Pi running Kali and (especially Aircrack :) ) - as a Uni project for my degree over a decade ago...surprised it took this long to be "discovered"
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
yes it's such a simple idea, and 90% cheaper and easy to execute than finding a 0day to exploit i am wondering why it hasn't been using... may be 4g modem can trace back to them??
@seal4080
@seal4080 Жыл бұрын
This, i thought this was relatively known already
@HobkinBoi
@HobkinBoi Жыл бұрын
@@vaisakhkm783 I think one could get away with using a prepaid simcard, you can buy those in cash and you can probably register with some fake info or something.
@iraniansuperhacker4382
@iraniansuperhacker4382 Жыл бұрын
@@vaisakhkm783 it probably is being used. Look at shellshock that shit was vulnerable for decades until it was officially found but I have a hard time believing it wasnt used before.
@jonhowells6271
@jonhowells6271 Жыл бұрын
"Discovered" is Orwellian newspeak for somebody got caught. Dig deep enough and you will find hackers using stock RC planes 10+ years ago for sniffing networks. More up to date and closer to home in the UK there's been a couple of cases where Pirate radio operators have dropped transmitters onto tall but otherwise inaccessible roof tops.
@examen1996
@examen1996 Жыл бұрын
I love this channel, also, whenever discussing a crime, my boy Seytonic comes with suggestions on how to better the tactics :)))
@igorthelight
@igorthelight Жыл бұрын
Write that down! Write that down! ;-)
@NeostormXLMAX
@NeostormXLMAX Жыл бұрын
He is jake tran for hackers
@thacrypt223
@thacrypt223 Жыл бұрын
Of course, these attacks are gonna get more sophisticated in the future. You told us all the ways to improve upon their flaws.
@geopoliticsjunkie4114
@geopoliticsjunkie4114 Жыл бұрын
We did this with a Parrot drone in 2014 "Try and keep up " You seem like a blast from the past to me
@CrypticConsole
@CrypticConsole Жыл бұрын
I like the term "fly by" attack.
@8BitShadow
@8BitShadow Жыл бұрын
Mmm bird analogies would work well honestly. 'stalking' for when the drone/attacker is staying within the area *of the victim itself* and is trying to find a good place to 'nest' while also trying to find an attack vector. 'Nesting' for when the drone is staying within the area *where the victim frequently tends to be* (work building, home, some coffee shop) and, after a vector has been found, optionally, 'littering'. 'littering' for when the drone is setting up devices ('litters') that can run independently from the drone's power, probably making multiple trips to carry the tools to nest so that the attack can be carried out without risking the drone and thus making finding the culprit all the more difficult. As for the attack itself: 'swooping' So in this case it'd be a simple 'swooping' attack where the drone only 'nested' and didn't 'litter'. While if the drone *did* litter it would be a 'litter swooping' attack, as it'd be the litter carrying out the attack instead of the drone (so to speak).
@SaltyViper
@SaltyViper Жыл бұрын
This guy birds. Fantastic idea.
@SaltyViper
@SaltyViper Жыл бұрын
Some dude down there said Packet Perching
@mattstorm360
@mattstorm360 Жыл бұрын
I like that. Just add Drone on the front and you are good. Drone Stalking Drone Nesting Drone Littering *What these attackers didn't do* Drone Swooping/Litter Swooping
@teddyruxpin3811
@teddyruxpin3811 Жыл бұрын
The problem with using a Lora module is the bandwidth is so slow. And the range is line of sight. It's not often actually several kilometers. The 4g modem would have been much faster and allow the hackers to work from the comfort of their own homes.
@willstikken5619
@willstikken5619 Жыл бұрын
It also adds a degree of traceability when discovered that you'll have to account for.
@goranjosic
@goranjosic Жыл бұрын
@@willstikken5619 yeah, definitely easier to follow Lora radio signal to source, then 4G
@willstikken5619
@willstikken5619 Жыл бұрын
@@goranjosic I didn't propose Lora as a solution. I simply pointed out that, assuming they are using a paid service, there is an opsec risk to using a 4g service.
@comicmask8306
@comicmask8306 Жыл бұрын
Drone attacks are going to revolve around remote connection to a device as if you were there, yet not. In that case, to make it hardware agnostic, the name of the attack should be a Poltergeist Attack, where you use a remote controlled malicious device to connect as if you were there. It doesn't just include drones, but can also include any device under your control you use remotely.
@An.Individual
@An.Individual Жыл бұрын
Great video. The Hacker Drone operators must have been close to the office to land on the roof.
@petemoss3160
@petemoss3160 Жыл бұрын
with a 4G modem you could have a 3rd party assemble and release these anywhere.
@exposednl5559
@exposednl5559 Жыл бұрын
some drones can fly km's
@HobkinBoi
@HobkinBoi Жыл бұрын
I don't think you'd have to do that, just launch a few blocks away or something, land on the roof, then you are already established. I think the main thing though is how long you can keep the drone on the roof before it's charge becomes too low to fly back. So i imagine they'd wanna launch pretty close by to have as much battery on board as possible left for them to hang there longer
@Iplayforfood88
@Iplayforfood88 Жыл бұрын
Ideally the drone didn't need to stay on the roof, they could have simply dropped a battery powered rig via the drone.
@TheFlyingP1g
@TheFlyingP1g Жыл бұрын
WiFly attack?
@stocktonjoans
@stocktonjoans Жыл бұрын
Wi-fi-pi-spy-fly-by attack?
@urspufos
@urspufos Жыл бұрын
Yes, I like it! 😁
@blubglub
@blubglub Жыл бұрын
If malware drones get popular enough, will we have to use physical anti-malware weapons? "Blow that piece of junk OUT OF THE SKY!"
@Crysal
@Crysal Жыл бұрын
The drone attack where they just leave them on site, should be called a "Dive bomb attack"
@j3r0_plays7
@j3r0_plays7 Жыл бұрын
Yes.
@stocktonjoans
@stocktonjoans Жыл бұрын
I dunno man, "Wi-fi-pi-spy-fly-by" has got a ring to it
@danielmiller8004
@danielmiller8004 Жыл бұрын
Why not just WI-SPY then?
@adamfra64
@adamfra64 Жыл бұрын
both of the above
@willstikken5619
@willstikken5619 Жыл бұрын
That sounds more like a Kamakazi or Stuka attack depending on whether you plan to retrieve the gear or not.
@Aci_yt
@Aci_yt Жыл бұрын
I think a simple name for attacks like this would be "Droning"
@Mr3344555
@Mr3344555 Жыл бұрын
Packet Perching - the act of using a drone to physically pen test a facility remotely
@bayersbluebayoubioweapon8477
@bayersbluebayoubioweapon8477 Жыл бұрын
This represents a serious security threat.
@marcopolo8584
@marcopolo8584 Жыл бұрын
I wonder if businesses will be allowed to secure their airspace in the future.
@gocrazy1513
@gocrazy1513 Жыл бұрын
@@neighbor472 rsk 4 life
@Nadesican
@Nadesican Жыл бұрын
Warflying. Also: Why the heck would you not strap a CAMERA or at the very least a motion sensor to the drone to detect humans? I can't imagine they wanted to lose those drones.
@HobkinBoi
@HobkinBoi Жыл бұрын
This is something I would've done, perhaps a script running on the pi to auto launch the drones off so you have a better chance of getting your equipment out automatically.
@vnc.t
@vnc.t 2 ай бұрын
the drones come with cameras, they tried to fly away but due to skill issue they crashed
@raphaelradespiel9970
@raphaelradespiel9970 Жыл бұрын
I'm from 2056 and this attack is commonly called "droning"
@a6dulsalam511
@a6dulsalam511 Жыл бұрын
😂😂🤣
@tokenfinnishguy8714
@tokenfinnishguy8714 Жыл бұрын
"What you are seeing is advanced warfare!"
@justgaming8867
@justgaming8867 Жыл бұрын
my man this is absolutely beautiful. being an engineering student who's pretty interested in particle physics and nuclear power i am stoked to try this
@manamsetty2664
@manamsetty2664 Жыл бұрын
Drone hacker can be named Cuckoo attack because it's like laying it's trap right in the persons building
@anthonyatienza3363
@anthonyatienza3363 Жыл бұрын
I wanna call it "Proxy nodding" or "nodeing" because I had an idea on attached a drone with such devices and use them to set up proxy nodes to further boast signal, or create a small web. This idea was for LoRa or "Meshtastic" communication only. Probably be good for directly breaking into places that rely on electronic security via wifi.
@allensmithphotography
@allensmithphotography Жыл бұрын
Automated aerial penetration vectors
@pikaa-si9ie
@pikaa-si9ie Жыл бұрын
Aapv👍
@Kalisthenics-rh5ce
@Kalisthenics-rh5ce 4 ай бұрын
Thanks Man! I love your informational viedeos and sometimes the info you give even helps me on projects and on.
@Sam-cp6so
@Sam-cp6so Жыл бұрын
the GPD, unless reported specifically as a miniature laptop was probably a typo of GPS since they may want to know when they're detected without using the drone's built-in GPS. I think there's an unfortunate sociological problem here as well: landing on the top floor of the building (the only place that is likely unseen) means you're likely to be targeting the C-suite office, where users have escalated privileges. Security by obscurity is mocked, but should businesses rethink putting their most important credentials on the top floor? Will a new need for security guards to patrol or monitor roofs arise?
@Adam-sw6iw
@Adam-sw6iw Жыл бұрын
The drone attack method should obviously be called CloudStrike.
@alainportant6412
@alainportant6412 Жыл бұрын
😂😂 Not monitoring the Bicoin transaction for multiple confirmations before releasing the decryption key is what makes this hack so human and hilarious😂😂
@oceanbytez847
@oceanbytez847 Жыл бұрын
Wasp hack. It's a small flying drone that attacks often unprovolked and has a sting that can wound very deeply relative to it's size.
@oceanbytez847
@oceanbytez847 Жыл бұрын
I think that the means in which the drone is used also matters. Wasp's would be any hack that is faciliated by a drone initially, but the drone is removed from the equation once the 'wasp' leaves after delivering the payload 'the venomous sting' and everything from thereon out can be done via the network or automation built into the malware like a virtual venom from the 'wasp'. A different name is needed for attacks that the drone remains a longterm factor.
@ens0246
@ens0246 Жыл бұрын
Skyhack sounds pretty cool. 'Nakatomi Plaza was subject to a skyhack"
@dahohi
@dahohi Жыл бұрын
Don't want to give anybody Ideas but if I had to do a pentest with a drone I would like you said use a smaller drone. But also, I wouldn't let the drone at the top of the building but rather use it as a transportation medium. Like carring a little box with power, lora, and a dev board to to what ever building you want. And if you are very fancy even a giro movement sensor that shorts the board if the box is moved.
@amb1u5
@amb1u5 Жыл бұрын
i would use a bigger drone as smaller drone props are higher pitch and noise travels further, but yeah just rig it with a servo to disconnect the load, even ad a small solar panel if needed
@amb1u5
@amb1u5 Жыл бұрын
@@llortaton2834 I don't get what you are saying, you must of misinterpreted what I said, I said I would use a drone with bigger propellers aka a bigger drone to haul the payload to the roof in which the load can be disconnected and the drone flown back to safety, I wouldn't call it a heavy load either when you'd really only need a raspberry pi or other pi or bone equivalent with a lora board and lipo or lipo bank and buck boost converters for the solar and the 5v dc
@chri-k
@chri-k Жыл бұрын
@@amb1u5 the problem is, if you are going to steal data, of which there is potentially gigabytes, LoRa is way too slow.
@amb1u5
@amb1u5 Жыл бұрын
@@chri-k your not wrong there, you could probably set up a point to point 2.4 or 5ghz setup which would still be better than dropping a modem on the roof with a registered sim card
@chri-k
@chri-k Жыл бұрын
@@amb1u5 That doesn’t seem too efficient either, considering you would prefer to say undetected.
@spencerc4110
@spencerc4110 Жыл бұрын
I've heard of drone attacks being called "Danger Drones" and "War flying"
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
okk now that's cool and doog< name
@superguy7044
@superguy7044 Жыл бұрын
the GPD was a redundancy backup for their man on the inside, he would probably have been expected to intercept the drone incase of crash or deployment failure, they could access the GPD to re-establish a connection with the primary controller manually. They must not have gotten a chance to get to the roof with an alibi and thus the drone was discovered before it was recovered
@aria.z124
@aria.z124 Жыл бұрын
3:52 seytonic making a "proof of consept" of this reminds me of the arduino rubber ducky he made.
@its_herocast276
@its_herocast276 Жыл бұрын
drones were always "here", therefore the title should've been "Cyber Criminals Caught Hacking With Drones"
@danielmiller8004
@danielmiller8004 Жыл бұрын
The drone attack can be called a wi-spy attack
@Matt47247523457
@Matt47247523457 Жыл бұрын
there was "drive by" attacks, now there's "fly by" attack
@pekrulz1
@pekrulz1 Жыл бұрын
It already has a name. "Warflying" is similar to the old wardriving. The early version of this was don with actual helicopters.
@LostInTheRush
@LostInTheRush Жыл бұрын
Warflying (or driving, walking etc.) is not inherently an attack. Flying around merely collecting WiFi data like SSIDs, channels, coordinates etc. can be considered warflying. It's recon.
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
that's totally different
@Red-im5pb
@Red-im5pb Жыл бұрын
After seeing how it attacks I suggest maybe Arial Wireless Phishing (AWP). Aerial because it uses a flying drone to get near its target. Wireless because it is controlled remotely and uses a wireless access point to lure the victim. Phishing because it uses a fake login page to give the victim a false sense of security. Or maybe just simply Aerial Data Snooping (ADS) Pls pardon my knowladge if its confusing im just starting my networking journy and im still going through the basics XD
@featherpony
@featherpony Жыл бұрын
That drone attack should be called a "Mosquito Attack". Just like a mosquito, it lands on its victim and bites and sits there.
@desertdude540
@desertdude540 Жыл бұрын
I'd suggest "fly on the ceiling attack".
@Fitnessdickinmymouth
@Fitnessdickinmymouth Жыл бұрын
If I'd call this attack, I'd call it the: "drone-by attack" 😂
@TheCreator1197
@TheCreator1197 Жыл бұрын
Sky hack? Drop hack? Cuckoo’s nest? Someone else mentioned Drone Nesting which I quite like 😂
@kellylynch8914
@kellylynch8914 Жыл бұрын
Hacker drones have been in use for the last ten years now
@danielreed5199
@danielreed5199 Жыл бұрын
Love your work man!
@Seytonic
@Seytonic Жыл бұрын
Thanks my dude : )
@UncleBoobs
@UncleBoobs Жыл бұрын
with the wifi pineapple you set it to pretend to be the target network, the client automatically "re-connects" to this network because it already recognizes it, then its identity can be taken over on the target network and the hacker can browse as the wifi user that was captured starbucks is a juicy target for this kind of attack because of the amount of people who go to coffee shops to log into their sensitive work/school/financial/socialnetwork accounts
@ko-Daegu
@ko-Daegu Жыл бұрын
5:29 what about: 👉🏻Skyjack As a name From sky and hijack As they are hijacking’s your stuff (AP, internal IP…etc)
@derrekvanee4567
@derrekvanee4567 Жыл бұрын
Dronenado 666! The dirty drunk Lahey craziest drone in the world, plus tornado.
@charleshines2142
@charleshines2142 Жыл бұрын
One other things that drones might do is they might be carrying devices on them to do a mousejack attack. This can also work on keyboards too. What they would do is inject keystrokes through vulnerable receivers for Bluetooth mice and keyboards. They might could make it appear that you typed a command to download and run a file. Such file would be malware that has some sort of nefarious purpose. It can be anything, they might steal your login passwords and user names, encrypt your files or even take control of your computer or all three. They might even make your computer a part of a bot net that does things like DDOS attacks even. They might install crypto miners on the computer too. They could do a variety of bad things if they ever got into your computer in any way. Not all wireless keyboards and mice are vulnerable to that attack but search before you buy if it is a concern to you. I know if I lived in a place where my computer would be closer to other rooms or apartment units I would be a little bit more concerned about it. The fact is where I am the nearest person is 300 feet away. Some WiFi routers don't have a strong enough signal to be picked up that far away or at least provide a stable connection from such a distance.
@willstikken5619
@willstikken5619 Жыл бұрын
Naming this will depend a lot on how the tactics actually evolve. If you're doing simple reconnaissance ala old school war driving it would seem straight forward to call it war droning or a war droid. If you plan to fly hardware to a facility like this and abandon it then it becomes a Kamakazi drone as its sacrificed in the attack. Personally, and depending on hardware I might go with something like a Cyber-Pi, Borg-Pineapple or just an IG-88 attack. These being translated as a Cybermen-esk RPi driven attack, a Borg-esk drone carrying a Wifi Pineapple or simply an assassin drone ala IG-88. We can’t presume that all drones used for this will be airborne. At the company I work for we did an experiment where we essentially built the mouse droid form star wars controlled by ardupilot and slapped a company logo on the side. With this we were able to tailgate through security and enter a facility full of security minded people and get little more than curious glances. A smaller version built with knowledge of our facility could have gotten through without drawing any attention. The larger version could have housed all of the hardware used here, essentially enter through the front door and carried out the same attack. By just making this look like one of our potential company projects we were able to get through a lot of doors that would have otherwise been closed. When we explained to leadership that we didn’t even really need to get through those doors they started to get the point.
@chri-k
@chri-k Жыл бұрын
i think it is much smarter to use the drone to drop a smaller payload, move the drone somewhere where you can pick it up later, and only then start doing something.
@willstikken5619
@willstikken5619 Жыл бұрын
@@chri-k That was closer to our V2 concept but with a ground based drone since an aerial approach would have drawn attention from our existing security. All the drone has to do is get the payload close enough access the wifi while preferably staying unnoticeable.
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
wow, now that's a lot of name for same thing
@truerandomchannel
@truerandomchannel Жыл бұрын
someone suggested drone nesting and i think that fits most things
@westtexas806
@westtexas806 Жыл бұрын
I would disguise the pi and batteries as a vent or something. Then drop the payload on the roof and bring the drone home. A small piece of tin would allow you to pick up with a magnet to remove payload.
@Yuri-bt4wl
@Yuri-bt4wl Жыл бұрын
dude ducttaped a whole computer to it lol
@alexosow
@alexosow Жыл бұрын
Dracking sounds like it could be a good name for drone hacking
@justhijs6954
@justhijs6954 9 ай бұрын
I would call this type of drone attack a Man-in-the-air attack.
@torak456
@torak456 Жыл бұрын
Depending on weight, a couple solar cells could extend the project (hack) lifetime. Better yet, if the hack goes unnoticed, but you have drained your batteries, over several days it may provide enough to recharge the drone just enough to perform a recovery.
@letsburn00
@letsburn00 Жыл бұрын
This is my thought too. A solar panel or two and you'd be way ahead. It would allow you to load up your batteries during weekends.
@jeroennederveen
@jeroennederveen Жыл бұрын
A name could be such a bird species that replace eggs from other birds with their own, like the Indigobird, Cowbird or Cuckoo. So, a Cuckoo hack maybe? Fly in, replace the eggs, and let the non-suspecting parents hatch the horror.
@crazyhairedcoder
@crazyhairedcoder Жыл бұрын
The drone attack should be called “SkyScraping” Pretty self explanatory 😂
@shubhamadtp
@shubhamadtp Жыл бұрын
I am not trying to give ideas here Le hacker taking notes
@halo4life166
@halo4life166 Жыл бұрын
Only thing I can think of is these new attacks being a sort of "drive by drone attack"
@plagefulbliss
@plagefulbliss Жыл бұрын
I'd like to suggest we use the term "Dracking" (Hacking through drones).
@funkepop
@funkepop Жыл бұрын
another guy suggested Drone Nesting, sounds a bit nicer
@FreedomStateIOCM
@FreedomStateIOCM Ай бұрын
@4:56 Thanks for the ideas!
@YachtyBurner
@YachtyBurner Жыл бұрын
I say we call the hacker drones “Hones” since they hone in on the wifi network and since hacking also starts with an H and because well drones
@gerowen
@gerowen Жыл бұрын
You could call drone hacking "strafing", like a strafing run from air support, since like that, it's meant to fly in, do a job, and then leave.
@MikeJones-mf2rt
@MikeJones-mf2rt Жыл бұрын
Subscribing to the idea of “cloud” services and closed-source IoT “smart networks” was the dumbest thing we collectively ever could have done with internet/tech...
@chri-k
@chri-k Жыл бұрын
could not be more true
@Scapestoat
@Scapestoat Жыл бұрын
Since it was such a botched together job, how about Bumblebee Attack? I love the little guys, but they're so bumbly!
@rowon8249
@rowon8249 Жыл бұрын
the reason they used mini laptop because it was the main device connected to company network where rpi just acted as 4lte gateway, so in practice they control rpi using reverse ssh then connect to min laptop , from laptop they connect to company network using wifi
@buckdaman8493
@buckdaman8493 Жыл бұрын
I knew somebody using a WiFi pineapple on a drone 2 years ago . Not new just newly discovered, even using captive portals .
@robertmiller445
@robertmiller445 Жыл бұрын
I'm going to nickname it a Waluigi attack. The long name would be Wireless Aerial Attack. Shortened to WAA which is what Waluigi says.
@paultwocock5421
@paultwocock5421 Жыл бұрын
5:26 Dracking or Drocking
@ejonesss
@ejonesss Жыл бұрын
the reason that $600 in bitcoin was used is because it is the yearly limit on what you can make without the irs considering it taxable. at the same time the transaction field can be used to put malware on the bitcoin network.
@GodswillBDone4WeThePeople
@GodswillBDone4WeThePeople Жыл бұрын
Thp has had em, they land in roofs above smart tvs and gather infor then leave , watched one hit all my neighbors
@hateeternalmaver
@hateeternalmaver Жыл бұрын
Yeah man, *Hacker Drone* ... I love the sound of that! ;D "I'll use my hacker drone" hehehe, that sounds awesome!
@mfaizsyahmi
@mfaizsyahmi Жыл бұрын
> What to call the hacker drones Well, it hacks via people (aka social hacking), so a manhack.
@AhmedIbrahim-ye4po
@AhmedIbrahim-ye4po Жыл бұрын
Hi Seytonic , great insight. I totally agree that drone-hacking can be a mouthful. I sure they'll come up some more befitting but I can only think of drioning (even though it has multitude of meanings including drone, male bee for mating and parasite ) and drone-swipe.
@motulok8842
@motulok8842 Жыл бұрын
This seems like a really crude setup as the entire thing could have been done way more covertly and cheaply. The biggest issue i have with their setup is the 4G modem. If the surrounding area has for example a parking lot, i would just use a shorter range transmitter that would transmit the data to some device in a parked car which could either have the 4G modem or just be checked once in a while. The whole thing could have easily been strapped to a way smaller drone and if they took some time, they could also design their own and fit the electronics inside so that it would look less suspicious. Overall a pretty bad execution on the hackers side.
@doncarleone973
@doncarleone973 Жыл бұрын
I heard Hak5 was in Watch Dogs 2. Or their gear was at least, one or the other. But yea, hacker drones are pretty popular these days. And they're becoming smaller and more badass each year. Maybe I'll build me one for Xmas 😜
@AbdAbdAbdAbd
@AbdAbdAbdAbd Жыл бұрын
Droning would be a neat name. Past tense would be Droned of course.
@vigilante_stark
@vigilante_stark Жыл бұрын
Might as well add a camera to it so if anyone comes near the drone, it flies off.
@differntname2807
@differntname2807 Ай бұрын
Hacker drones should be called skynet attacks.
@eldoprano
@eldoprano Жыл бұрын
I can imagine them thinking of buying a third drone and strapping it with a powerful GPU to "crack the hashes" xD
@Iloveallofyou1917
@Iloveallofyou1917 Жыл бұрын
Best name would be a "pi in the sky" attack or for the really cool "sky-pi"
@curranhouse
@curranhouse Жыл бұрын
What about "Drone-Own" ? Bet the company was like thanks for free drones. The hackers by using a specialist drone also because of low volume of the expensive might be traceable via its serial number..
@zachp97
@zachp97 Жыл бұрын
The drone thing is interesting, maybe “Cuckoo Drone” or may just the generic “parasite drone”
@flannelsone1159
@flannelsone1159 Жыл бұрын
We should call it an Ariel ambush attack
@thegamer-gz5cr
@thegamer-gz5cr Жыл бұрын
I think we could call the drone attacks "Swarms", IDK
@federalagenciesarecourtesans
@federalagenciesarecourtesans Жыл бұрын
Soon these drones will be monstrous and they’ll be used to take entire armored vehicles along with kidnapping joggers and preferably golfers, rich golfers.
@Noobificado
@Noobificado Жыл бұрын
This sounds is kind of a DarkVishnya attack. May be call it Air Vishnya attack? Since the devices are not physically connected to a device on the network.
@GhostPrivacy
@GhostPrivacy Жыл бұрын
This is obviously the opportune time to call it WAR-DRONING. Since it's so akin to war-driving. Who's with me!
@WaspLife
@WaspLife Жыл бұрын
lol we made Danger Drone at Bishop Fox a *long* time ago.
@r0bo11
@r0bo11 Жыл бұрын
Squidy -- like the flying squid hacker drones in the Matrix
@zackjohnston-watson4874
@zackjohnston-watson4874 Жыл бұрын
Airdrop attack, Skynet attack, ummm shooting the moon
@susuooo1
@susuooo1 Жыл бұрын
The drone attack shuld be called spyfly. Like the pesky insect and spy like you know but it has also badly translated danish because in denmark spyflue means blow fly but when you translate one half or use Google translate you end with spyfly
@EchoMirage72
@EchoMirage72 11 ай бұрын
Something doesn't sit right with the drone attack. Why would the hackers not be monitoring the drones physical security? Why just leave them sitting on the roof in the open, and then not fly off when they were discovered.
@overcheats4518
@overcheats4518 Жыл бұрын
awesome as always Seytonic its a pleasure ❤
@madscientistslab1
@madscientistslab1 Жыл бұрын
Droid Attacks. Drones on steroids. Lol
Exploiting Calculator.exe For Hacking
8:33
Seytonic
Рет қаралды 205 М.
Russian Missile Alert System Hacked
9:24
Seytonic
Рет қаралды 131 М.
Lehanga 🤣 #comedy #funny
00:31
Micky Makeover
Рет қаралды 26 МЛН
小宇宙竟然尿裤子!#小丑#家庭#搞笑
00:26
家庭搞笑日记
Рет қаралды 31 МЛН
OMG what happened??😳 filaretiki family✨ #social
01:00
Filaretiki
Рет қаралды 7 МЛН
How I Make Kamikaze Drones
12:36
Civ Div
Рет қаралды 167 М.
Hacking a Prison TV!
9:27
Action Retro
Рет қаралды 34 М.
All Apple Products are Vulnerable to New Password Stealing Hack
10:42
The Accidental $70k Android Hack
10:01
Seytonic
Рет қаралды 117 М.
Hacking Drones With a Child's Toy
9:11
Michael Reeves
Рет қаралды 8 МЛН
The ChatGPT Scam
9:30
Seytonic
Рет қаралды 295 М.
How Open Source Discord "Raiding" tools hide Malware
11:08
Eric Parker
Рет қаралды 11 М.
RTX4090 is a Password Cracking BEAST
10:41
Seytonic
Рет қаралды 259 М.
DIY Drones: War Will Never be the Same
19:50
Johnny Harris
Рет қаралды 1,4 МЛН
Harley Quinn's plan for revenge!!!#Harley Quinn #joker
0:49
Harley Quinn with the Joker
Рет қаралды 27 МЛН
Спроси у мамы, спроси у папы
0:54
КЕРЯ
Рет қаралды 2,6 МЛН
МБАППЕ слил УЧАСТНИЦУ🥶 #2дротс #мбаппе #2drotsdays #мбэйп
0:17
黑天使遇到什么了?#short #angel #clown
0:34
Super Beauty team
Рет қаралды 36 МЛН
Умный УЧИТЕЛЬ против УЧЕНИКОВ 😱 #shorts
0:59
Лаборатория Разрушителя
Рет қаралды 3,2 МЛН