Track WiFi Devices from the Air with a WarFlying Drone
Alex Lynd demonstrates how a drone can be used for aerial WiFi reconnaissance, using an improvised $15 WarDriving rig strapped to the bottom of a Mavic Pro drone - and how we can track down the location of known wifi devices from the air. This video is sponsored by PCBWay, whose PCB manufacturing & assembly services can be found over at https://www.pcbway.com/
On this episode of HakByte, we explore WarFlying for the first time, and use Jupyter Notebook to create visual maps of the data we captured.
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Links:
WarFlying Github Demo + Data: https://github.com/AlexLynd/ESP8266-Wardriving/blob/master/JN-Scripts/Missoula-Warflight-08-21-2021.ipynb
Alex's GitHub: https://github.com/AlexLynd
Alex's Twitter: https://twitter.com/AlexLynd
Alex's Website: http://alexlynd.com
Alex's Youtube: @AlexLynd
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Chapters:
Intro @AlexLynd : 00:00
What is WarDriving? 00:17
$15 ESP8266 WarFlying Rig 00:43
Drone WiFi Recon Experiment 00:54
PCBWay Ad 01:38
Cleaning our Data in Python Pandas 01:51
Visualize WiFi Recon w/ Folium Maps 03:55
Track & Map Victim Devices 06:42
Drone Footage Review + Results 07:58
Interactive Encryption Map 08:41
Recap + Outro 10:09
Bloopers :) 11:02
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео Track WiFi Devices from the Air with a WarFlying Drone канала Hak5
On this episode of HakByte, we explore WarFlying for the first time, and use Jupyter Notebook to create visual maps of the data we captured.
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Links:
WarFlying Github Demo + Data: https://github.com/AlexLynd/ESP8266-Wardriving/blob/master/JN-Scripts/Missoula-Warflight-08-21-2021.ipynb
Alex's GitHub: https://github.com/AlexLynd
Alex's Twitter: https://twitter.com/AlexLynd
Alex's Website: http://alexlynd.com
Alex's Youtube: @AlexLynd
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Chapters:
Intro @AlexLynd : 00:00
What is WarDriving? 00:17
$15 ESP8266 WarFlying Rig 00:43
Drone WiFi Recon Experiment 00:54
PCBWay Ad 01:38
Cleaning our Data in Python Pandas 01:51
Visualize WiFi Recon w/ Folium Maps 03:55
Track & Map Victim Devices 06:42
Drone Footage Review + Results 07:58
Interactive Encryption Map 08:41
Recap + Outro 10:09
Bloopers :) 11:02
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео Track WiFi Devices from the Air with a WarFlying Drone канала Hak5
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Hak5 - Yubico Interview with Stina Ehrensvärd Part 1](https://i.ytimg.com/vi/mxmEnL0WIFo/default.jpg)
![Amazon FINED For Privacy Violations - ThreatWire](https://i.ytimg.com/vi/0XyODke1vt4/default.jpg)
![Top 5 CTFs to Get Started with Ethical Hacking](https://i.ytimg.com/vi/k3qvzjRrjCc/default.jpg)
![New Ransomware Targets Linux - ThreatWire](https://i.ytimg.com/vi/FBGbolXt2I8/default.jpg)
![CyberAttackers Use Squid Game To Lure In Victims - ThreatWire](https://i.ytimg.com/vi/D4QMssZgaXM/default.jpg)
![Spring4Shell Patches Released; Hydra Is Beheaded - ThreatWire](https://i.ytimg.com/vi/oxu8oxOvicE/default.jpg)
![LAPSUS$ Hacker Group Arrests; Okta Breached - ThreatWire](https://i.ytimg.com/vi/KjrDO_xfWTM/default.jpg)
![Configuring LTE on Pineapple Mk7 For Out-Of-Band Exfil w/Glytch](https://i.ytimg.com/vi/TtZ_94WA5is/default.jpg)
![Razer Mice + Microsoft Windows = Privilege Escalation - ThreatWire](https://i.ytimg.com/vi/NA1ocWiAMVg/default.jpg)
![Apple ID, Now With Hardware Keys! - ThreatWire](https://i.ytimg.com/vi/3gq29LLKhxY/default.jpg)
![Online Card Skimmers Hit E-Commerce, Two Arrested For Allegedly Laundering Bitcoin - ThreatWire](https://i.ytimg.com/vi/_iPxwiY_FRA/default.jpg)
![Hacking Stay-Logged-In Cookies with Owasp Zap | HakByte](https://i.ytimg.com/vi/YRngT1fP1JA/default.jpg)
![Learn Polymorphic Powershell Payload Techniques! [PAYLOAD]](https://i.ytimg.com/vi/AMda5LWkVj4/default.jpg)
![NEW Version 2.0 + 5 GHz Upgrade! 🍍 WiFi Pineapple Mark VII 🕶](https://i.ytimg.com/vi/_s5NDXYY-Z8/default.jpg)
![The RESTRICT Act: TLDR? Watch This - ThreatWire](https://i.ytimg.com/vi/REb0Ya_6AWI/default.jpg)
![The Biggest DDoS In History - ThreatWire](https://i.ytimg.com/vi/HIyerGh0ZLc/default.jpg)
![553 Million Affected In Facebook Leak, Call of Duty: Warzone Cheats are Actually Malware- ThreatWire](https://i.ytimg.com/vi/LvNjRsIGI24/default.jpg)
![HakByte: Gather WiFi Reconnaissance on this $5 MicroController](https://i.ytimg.com/vi/SPOCmnPj41E/default.jpg)
![Zero Days Are On The Rise - ThreatWire](https://i.ytimg.com/vi/kn2GKBWXwm8/default.jpg)
![Discord and Slack Used To Spread RATs - ThreatWire](https://i.ytimg.com/vi/mdTnhUJFnno/default.jpg)