SlideShare a Scribd company logo
Defeating Drones
Nikhil Razdan
Introduction


Education: Computer Science Engineer



Job: Information Security
Agenda
Part 1 :


UAV construction

> Hardware

> Software
> Calibration
> Working
Part 2:


GPS Concepts

Part 3:


Attacking GPS

> Jammer
> Spoofing
Part 4:


Skyjack
UAV Construction (Hardware)


Fixed-wing aircraft



Micro-controller (APM)



Servo Motors



Brush-less Motor



Battery



RF module



GPS Receiver
UAV Construction (Software)


Goto http://code.google.com/p/ardupilotmega/wiki/MPInstallation1
UAV Construction (Software)
copter.ardupilot.com



#include <SoftwareSerial.h>
#include <TinyGPS.h>




long lat,lon; // create variable for
latitude and longitude object




SoftwareSerial gpsSerial(2, 3); //
create gps sensor connection
Consider that:


The uav will start its course on acquiring the
GPS data
GPS


GPS is satellite based navigation system



Developed by DoD, US in the 1970’s



Fully operational by 1995





Consists of 24 and 3 stand-by satellites

Provides:
1.Position i.e. Lat,Long,Altitude
2.Velocity

3.Time (UTC)
GPS Concepts


Pythagorean theorem and using a scale



Application of Trilateration



http://library.thinkquest.org/05aug/01390/anim
ation.htm
GPS Signals


Transmists 2 low power radio signals

L1 and L2


Civilian use L1



Contains 3 different bits of information

1 Pseudorandom code (identify satellite)
2 Ephemeris data (status of the satellite)
3 Almanac data (orbital information)
GPS Receiver






So, whats being transmitted?
Information about the satellite and precise
timing data from the atomic clocks aboard the
satellite(Nav/System information)
Unique identification code (C/A code)
GPS Receiver




The Nav/System information + C/A code is
combined and then modulated within the
carrier wave
So, the receiver locks onto the signal from
several GPS satellites simultaneously.
GPS Receiver


2 MHz gps spectrum, still too fast to be
sampled by ADC



So shift it down to 0-2 MHz



Use trig! CosAcosB = cos(A-B)+cos(A+B)/2





So you get sum of frequency and a difference
of frequency

Mixer is analog multiplier
GPS Receiver
Jamming Signals


Specific frequency L1 and L2



L1 frequency – 1575.42 MHz
Jamming Signals









PLL : Set it to 1575.42 MHz (l1 frequency)

Noise Generator: Generate noise at 1575.42
MHz
RF Amplifier:
Voltage Regulation: Power, current:
300milliamps

Antenna: example Yagi antenna for directional
radiating application
GPS Spoofing
An Iranian engineer claimed in an interview that
“Iran managed to jam the drone’s
communication links to American operators”
causing the drone to shift into an autopilot
mode that relies solely on GPS to guide itself
back to its home base in Afghanistan. With the
drone in this state, the Iranian engineer
claimed that “Iran spoofed the drone’s GPS
system with false coordinates, fooling it into
thinking it was close to home and landing into
Iran’s clutches.”
GPS Spoofing


Jamming L2 signals ?



Spoofing L1 signals!?

What happens when you spoof signals

PVT solution of the UAV’s GPS receiver are
influenced.
GPS Spoofing
HOW?


Commercial Signal Simulator

http://www.spirent.com/Positioning-and-Navigation/What_is_GPS_Simulation

Requirements:


Power Amplifier



Antenna



Lot of money :P
GPS Spoofing



The previous method can raise alarm
So we use a receiver spoofer without breaking
the gps lock
GPS Spoofing

Picture grabbed from http://gpsworld.com/defensesecurity-surveillanceassessing-spoofing-threat-3171/
GPS Spoofing
How??






Acquire and track L1, L2 and obtain navigation
solution
Enter feedback mode to produce counterfeit
signal
Spoofer use this signal to calibrate digitized
spoofed signal and output of analog spoofed
signal
GPS Spoofing




Spoofer aligns spoofed signals after feedback
stage
Gradually raises power in order to spoof the
receiver, slightly above that of authentic
signals
SkyJack


Software used:

Perl application
aircrack-ng

node-ar-drone (node.js)
SkyJack


Hardware used:

Rasberry Pi
Alfa adapter

Wireless adapter
SkyJack


Packet Injection

Interfere with established networks
Appear as if they are part of normal
communication stream
Usually used in mitm or dos
SkyJack


Packet Injection

Involves creating a raw socket (its not protocol
specific)
SkyJack


Setting up monitor mode

> Find out what interface is your card using by
ifconfig wlan0
> Find out what mode the card currently is
iwconfgig
> Switch off wireless card to edit settings ::
ifconfig wlan0 down
> Switch the wireless card to monitor mode ::
iwconfig wlan0 mode monitor

> Check whether the card is in monitor mode ::
SkyJack




Deauthentication Overview
The 802.11 standard requires all the client
nodes in a network to associate with an
access point before transmitting data.
Deauthentication
Step 1: The victim initiates authentication with
the access point. The attacker is monitoring.
Step 2: The victim completes authentication with
the access point.
The attacker continues monitoring.
Step 3: The victim initiates association with the
access point. The attacker is still monitoring..
Step 4: Association completes. The victim is now
ready to send data

Step 5: The attacker now sends a
Deauthentication




AP honors the request sent by the attacker
blindy.
There is no verification.

“ aireplay-ng -0 1 -a 00:14:6C:7E:40:80 -c
00:0F:B5:34:30:30 ath0 ”
Reference


https://entropia.de/GPS_Jammer



http://gpsworld.com/drone-hack/






http://gpsworld.com/defensesecuritysurveillanceassessing-spoofing-threat-3171/
http://samy.pl/skyjack/
http://users.ece.cmu.edu/~dbrumley/courses/1
8487-f12/readings/Nov28_GPS.pdf

More Related Content

What's hot

Arduino: interruptor de encendido controlado por Internet
Arduino: interruptor de encendido controlado por InternetArduino: interruptor de encendido controlado por Internet
Arduino: interruptor de encendido controlado por Internet
SANTIAGO PABLO ALBERTO
 
Slide presentation
Slide presentationSlide presentation
Slide presentation
TSOKOH FRANK
 
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONGCODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE
 
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh GhodelaDDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
Chandan Singh Ghodela
 
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalThotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
pricemcdonald
 
War Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraWar Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless Camera
Edgefxkits & Solutions
 
Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4
PT. Siwali Swantika
 
Network Sniffing
Network SniffingNetwork Sniffing
Network Sniffing
Sachin Tripathi
 
Sentinel-247 Remote Tank Monitoring
Sentinel-247 Remote Tank MonitoringSentinel-247 Remote Tank Monitoring
Sentinel-247 Remote Tank Monitoring
mshasan3
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
Nicolas Lesconnec
 
Medium Performance Gyroscopes
Medium Performance GyroscopesMedium Performance Gyroscopes
Medium Performance Gyroscopes
Premier Farnell
 
Project seminar for group
Project seminar for groupProject seminar for group
Project seminar for group
uche55nna
 
Sigfox World Expo - Advanced Workshop
Sigfox World Expo - Advanced WorkshopSigfox World Expo - Advanced Workshop
Sigfox World Expo - Advanced Workshop
Nicolas Lesconnec
 
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET Journal
 
Health monitoring and position tracking of a Soldier by using LoRa communication
Health monitoring and position tracking of a Soldier by using LoRa communicationHealth monitoring and position tracking of a Soldier by using LoRa communication
Health monitoring and position tracking of a Soldier by using LoRa communication
Varshita Puchakayala
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
vanhoefm
 
Fire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systemsFire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systems
grantlerc
 
How to find the ip address of new rock device using wireshark
How to find the ip address of new rock device using wiresharkHow to find the ip address of new rock device using wireshark
How to find the ip address of new rock device using wireshark
Ikundu Gatambia
 
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTkiran bansod
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 

What's hot (20)

Arduino: interruptor de encendido controlado por Internet
Arduino: interruptor de encendido controlado por InternetArduino: interruptor de encendido controlado por Internet
Arduino: interruptor de encendido controlado por Internet
 
Slide presentation
Slide presentationSlide presentation
Slide presentation
 
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONGCODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
 
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh GhodelaDDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
 
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalThotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
 
War Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraWar Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless Camera
 
Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4
 
Network Sniffing
Network SniffingNetwork Sniffing
Network Sniffing
 
Sentinel-247 Remote Tank Monitoring
Sentinel-247 Remote Tank MonitoringSentinel-247 Remote Tank Monitoring
Sentinel-247 Remote Tank Monitoring
 
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
[Feb 2020] Cours IoT - CentraleSupelec - Master SIO
 
Medium Performance Gyroscopes
Medium Performance GyroscopesMedium Performance Gyroscopes
Medium Performance Gyroscopes
 
Project seminar for group
Project seminar for groupProject seminar for group
Project seminar for group
 
Sigfox World Expo - Advanced Workshop
Sigfox World Expo - Advanced WorkshopSigfox World Expo - Advanced Workshop
Sigfox World Expo - Advanced Workshop
 
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
 
Health monitoring and position tracking of a Soldier by using LoRa communication
Health monitoring and position tracking of a Soldier by using LoRa communicationHealth monitoring and position tracking of a Soldier by using LoRa communication
Health monitoring and position tracking of a Soldier by using LoRa communication
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
Fire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systemsFire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systems
 
How to find the ip address of new rock device using wireshark
How to find the ip address of new rock device using wiresharkHow to find the ip address of new rock device using wireshark
How to find the ip address of new rock device using wireshark
 
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPT
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 

Similar to Defeating Drones

[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
CODE BLUE
 
ILS.pptx
ILS.pptxILS.pptx
Unit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdfUnit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdf
1ms21cs111
 
Drone project 2020 GROUP PPT
Drone project 2020 GROUP PPTDrone project 2020 GROUP PPT
Drone project 2020 GROUP PPT
Hitesh A H
 
IoT Project Analysis Report of Year 1 - Project Semester 2.
IoT Project Analysis Report of Year 1 - Project Semester 2.IoT Project Analysis Report of Year 1 - Project Semester 2.
IoT Project Analysis Report of Year 1 - Project Semester 2.
RobertSolomon23
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
Chema Alonso
 
Fudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to InternalsFudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to Internals
Kiran Divekar
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android Devices
Ben Graham
 
Playing in a Satellite environment
Playing in a Satellite environmentPlaying in a Satellite environment
Playing in a Satellite environment
Christian Martorella
 
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
Mal Mai
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET Journal
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
Hariraj Rathod
 
FOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS applicationFOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS application
The European GNSS Agency (GSA)
 
Open-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera SystemOpen-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera System
Centre of Geographic Sciences (COGS)
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
Erez Metula
 
Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]
Sivajyothi paramsivam
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET Journal
 
side-channel-kevin2600
side-channel-kevin2600side-channel-kevin2600
side-channel-kevin2600
Kevin2600
 
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
WizApsProjects
 

Similar to Defeating Drones (20)

[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
 
ILS.pptx
ILS.pptxILS.pptx
ILS.pptx
 
SDP15_poster
SDP15_posterSDP15_poster
SDP15_poster
 
Unit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdfUnit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdf
 
Drone project 2020 GROUP PPT
Drone project 2020 GROUP PPTDrone project 2020 GROUP PPT
Drone project 2020 GROUP PPT
 
IoT Project Analysis Report of Year 1 - Project Semester 2.
IoT Project Analysis Report of Year 1 - Project Semester 2.IoT Project Analysis Report of Year 1 - Project Semester 2.
IoT Project Analysis Report of Year 1 - Project Semester 2.
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
 
Fudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to InternalsFudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to Internals
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android Devices
 
Playing in a Satellite environment
Playing in a Satellite environmentPlaying in a Satellite environment
Playing in a Satellite environment
 
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
Field Programmable Gate Array(FPGA) Application In Instrument Landing System...
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
FOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS applicationFOSTER ITS _ a trusted GNSS module to secure ITS application
FOSTER ITS _ a trusted GNSS module to secure ITS application
 
Open-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera SystemOpen-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera System
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
 
Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using Audio
 
side-channel-kevin2600
side-channel-kevin2600side-channel-kevin2600
side-channel-kevin2600
 
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)Smart Security System  Using ARM And XBee For Boarder Areas( SYNOPSIS)
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)
 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Metasploit primary
Metasploit primaryMetasploit primary
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
 
Linux for hackers
Linux for hackersLinux for hackers
Android Pentesting
Android PentestingAndroid Pentesting

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Defeating Drones