SlideShare a Scribd company logo
1 of 42
Writing Secure Mobile Apps for Drones
Godfrey Nolan
Presentation Overview
• How to hack a drone
• Famous Drone Hacks
• Mobile Apps
• Manufacturer’s SDKs
• Top 10 Mobile Security Risks
• Best Practices
• Resources
9/11/2017 Writing Secure Mobile Apps 2
01.
How to hack a drone
How to hack a drone
• Connect via wifi (ssh/telnet)
9/11/2017 Writing Secure Mobile Apps 4
How to hack a drone
• Connect via wifi (ssh/telnet)
• Using RF (GNU Radio/Hack RF)
9/11/2017 Writing Secure Mobile Apps 5
How to hack a drone
• Connect via wifi (ssh/telnet)
• Using RF (GNU Radio/Hack RF)
• Hijack Video
9/11/2017 Writing Secure Mobile Apps 6
How to hack a drone
• Connect via wifi (ssh/telnet)
• Using RF (GNU Radio/Hack RF)
• Hijack Video
• Physical attack
9/11/2017 Writing Secure Mobile Apps 7
How to hack a drone
• Connect via wifi (ssh/telnet)
• Using RF (GNU Radio/Hack RF)
• Hijack Video
• Physical Attack
• Jamming
9/11/2017 Writing Secure Mobile Apps 8
How to hack a drone
• Connect via wifi (ssh/telnet)
• Using RF (GNU Radio/Hack RF)
• Hijack Video
• Physical Attack
• Jamming
• Mobile apps
9/11/2017 Writing Secure Mobile Apps 9
02.
Famous drone hacks
Some (relatively) famous drone hacks
9/11/2017 Writing Secure Mobile Apps 11
Some (relatively) famous drone hacks
9/11/2017 Writing Secure Mobile Apps 12
Some (relatively) famous drone hacks
9/11/2017 Writing Secure Mobile Apps 13
03.
Mobile apps
Mobile Apps
9/11/2017 Writing Secure Mobile Apps 15
Mobile apps
9/11/2017 Writing Secure Mobile Apps 16
04.
Manufacturer’s SDKs
Manufacturer’s SDKs
9/11/2017 Writing Secure Mobile Apps 18
Manufacturer’s SDKs
9/11/2017 Writing Secure Mobile Apps 19
05.
Top 10 Mobile Security Risks
OWASP Top 10 Mobile Security Risks
• M1 - Improper Platform Usage
• M2 - Insecure Data Storage
• M3 - Insecure Communication
• M4 - Insecure Authentication
• M5 - Insecure Cryptography
• M6 – Insecure Authorization
• M7 – Poor Code Quality
• M8 – Code Tampering
• M9 – Reverse Engineering
• M10 – Extraneous Functionality
9/11/2017 Writing Secure Mobile Apps 21
OWASP Top 10 Mobile Security (for Drones)
• M1 - Improper Platform Usage
• M2 - Insecure Data Storage
• M3 - Insecure Communication
• M4 - Insecure Authentication
• M5 - Insecure Cryptography
• M6 – Insecure Authorization
• M7 – Poor Code Quality
• M8 – Code Tampering
• M9 – Reverse Engineering
• M10 – Extraneous Functionality
9/11/2017 Writing Secure Mobile Apps 22
M2 – Insecure Data Storage
9/11/2017 Writing Secure Mobile Apps 23
M2 – Insecure Data Storage
9/11/2017 Writing Secure Mobile Apps 24
M2 – Insecure Data Storage
9/11/2017 Writing Secure Mobile Apps 25
• Don’t store passwords, SSNs etc.
• Use multi-factor authentication
• Client and Server side access control
• "Sensitive data should be encrypted and very sensitive data
should be stored on server" - Zapata
M3 – Insecure Communication
9/11/2017 Writing Secure Mobile Apps 26
M3 – Insecure Communication
9/11/2017 Writing Secure Mobile Apps 27
M5 – Insecure Cryptography
9/11/2017 Writing Secure Mobile Apps 28
M6 – Insecure Authorization
9/11/2017 Writing Secure Mobile Apps 29
M9 – Reverse Engineering
9/11/2017 Writing Secure Mobile Apps 30
M9 – Reverse Engineering
9/11/2017 Writing Secure Mobile Apps 31
Jailbreaking & Rooting
9/11/2017 Writing Secure Mobile Apps 32
Jailbreaking & Rooting
9/11/2017 Writing Secure Mobile Apps 33
06.
Best Practices
Best Practices
• Don’t store any sensitive user info locally
• No hard coding API keys
• Use SSL pinning and SafetyNet API
• Expire sessions
• Trust but verify
• Turn on obfuscation
9/11/2017 Writing Secure Mobile Apps 35
07.
Good News Bad News
Good News
• Google and Apple are starting to help
• SafetyNet checks that a phone is rooted
9/11/2017 Writing Secure Mobile Apps 37
Good News
9/11/2017 Writing Secure Mobile Apps 38
Bad News
• Tools are still evolving
9/11/2017 Writing Secure Mobile Apps 39
08.
Resources Q&A
Resources
http://developer.dji.com
http://developer.3dr.com
http://developer.yuneec.com
http://developer.parrot.com
https://medium.com/@swalters/how-can-drones-be-hacked-the-updated-list-of-
vulnerable-drones-attack-tools-dd2e006d6809
https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
https://slides.com/godfreynolan/bulletproofandroidmeetup
9/11/2017 Writing Secure Mobile Apps 41
Q&A
• godfrey@riis.com
• @godfreynolan
• riis.com/blog
• slides.com/godfreynolan
9/11/2017 Writing Secure Mobile Apps 42

More Related Content

What's hot

Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneySplunk
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityRobert Hurlbut
 
Monitoring with Artificial Intelligence [Webinar]
Monitoring with Artificial Intelligence [Webinar]Monitoring with Artificial Intelligence [Webinar]
Monitoring with Artificial Intelligence [Webinar]Dynatrace
 
Encrypting SMS with PGP
Encrypting SMS with PGPEncrypting SMS with PGP
Encrypting SMS with PGPAngel Parrales
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi North Texas Chapter of the ISSA
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsNetLockSmith
 
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7Spiffy
 
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"SMART Infrastructure Facility
 
Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Mohammad Shahid
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile SecurityMichalis Kamprianis
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraPriyanka Aash
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany Splunk
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Dynatrace
 

What's hot (18)

Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
The Instant Web
The Instant WebThe Instant Web
The Instant Web
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the Journey
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Monitoring with Artificial Intelligence [Webinar]
Monitoring with Artificial Intelligence [Webinar]Monitoring with Artificial Intelligence [Webinar]
Monitoring with Artificial Intelligence [Webinar]
 
Encrypting SMS with PGP
Encrypting SMS with PGPEncrypting SMS with PGP
Encrypting SMS with PGP
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7
MS TechDays 2011 - Mango, Mango! Developing for Windows Phone 7
 
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
 
Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.
 
(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security(ISC)2 Kamprianis - Mobile Security
(ISC)2 Kamprianis - Mobile Security
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...
 

Similar to Writing Secure Mobile Apps for Drones

Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecNowSecure
 
Mobile Security - Dutch Mobile .Net Developers
Mobile Security - Dutch Mobile .Net DevelopersMobile Security - Dutch Mobile .Net Developers
Mobile Security - Dutch Mobile .Net DevelopersAlberto Aguzzi
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
How to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-EndHow to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-EndLahav Savir
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...Splunk
 
Today's Predictions for Tomorrow's Connected World
 Today's Predictions for Tomorrow's Connected World  Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World Symantec
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Adam Tice
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum
 
Extending Zeek for ICS Defense
Extending Zeek for ICS DefenseExtending Zeek for ICS Defense
Extending Zeek for ICS DefenseJames Dickenson
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 

Similar to Writing Secure Mobile Apps for Drones (20)

Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
Mobile Security - Dutch Mobile .Net Developers
Mobile Security - Dutch Mobile .Net DevelopersMobile Security - Dutch Mobile .Net Developers
Mobile Security - Dutch Mobile .Net Developers
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
How to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-EndHow to Secure Your AWS Powered Mobile App End-to-End
How to Secure Your AWS Powered Mobile App End-to-End
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Today's Predictions for Tomorrow's Connected World
 Today's Predictions for Tomorrow's Connected World  Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
The Evolution of Mobile Security
The Evolution of Mobile SecurityThe Evolution of Mobile Security
The Evolution of Mobile Security
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security Briefing
 
Certificate Pinning: Not as Simple as It Sounds
Certificate Pinning: Not as Simple as It Sounds Certificate Pinning: Not as Simple as It Sounds
Certificate Pinning: Not as Simple as It Sounds
 
Extending Zeek for ICS Defense
Extending Zeek for ICS DefenseExtending Zeek for ICS Defense
Extending Zeek for ICS Defense
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 

More from Godfrey Nolan

Counting Cars with Drones
Counting Cars with DronesCounting Cars with Drones
Counting Cars with DronesGodfrey Nolan
 
Customising QGroundControl
Customising QGroundControlCustomising QGroundControl
Customising QGroundControlGodfrey Nolan
 
Parrot Tutorials in Kotlin
Parrot Tutorials in KotlinParrot Tutorials in Kotlin
Parrot Tutorials in KotlinGodfrey Nolan
 
DJI Mobile SDK Tutorials in kotlin
DJI Mobile SDK Tutorials in kotlinDJI Mobile SDK Tutorials in kotlin
DJI Mobile SDK Tutorials in kotlinGodfrey Nolan
 
Getting started with tensor flow datasets
Getting started with tensor flow datasets Getting started with tensor flow datasets
Getting started with tensor flow datasets Godfrey Nolan
 
Using ML to make your UI tests more robust
Using ML to make your UI tests more robustUsing ML to make your UI tests more robust
Using ML to make your UI tests more robustGodfrey Nolan
 
Counting sheep with Drones and AI
Counting sheep with Drones and AICounting sheep with Drones and AI
Counting sheep with Drones and AIGodfrey Nolan
 
The Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareThe Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareGodfrey Nolan
 
From Maps to Apps the Future of Drone Technology
From Maps to Apps the Future of Drone TechnologyFrom Maps to Apps the Future of Drone Technology
From Maps to Apps the Future of Drone TechnologyGodfrey Nolan
 
Tableau 10 and quickbooks
Tableau 10 and quickbooksTableau 10 and quickbooks
Tableau 10 and quickbooksGodfrey Nolan
 
Network graphs in tableau
Network graphs in tableauNetwork graphs in tableau
Network graphs in tableauGodfrey Nolan
 

More from Godfrey Nolan (20)

Counting Cars with Drones
Counting Cars with DronesCounting Cars with Drones
Counting Cars with Drones
 
Customising QGroundControl
Customising QGroundControlCustomising QGroundControl
Customising QGroundControl
 
DJI Payload SDK
DJI Payload SDKDJI Payload SDK
DJI Payload SDK
 
Parrot Tutorials in Kotlin
Parrot Tutorials in KotlinParrot Tutorials in Kotlin
Parrot Tutorials in Kotlin
 
DJI Mobile SDK Tutorials in kotlin
DJI Mobile SDK Tutorials in kotlinDJI Mobile SDK Tutorials in kotlin
DJI Mobile SDK Tutorials in kotlin
 
Drone sdk showdown
Drone sdk showdownDrone sdk showdown
Drone sdk showdown
 
AI/ML in drones
AI/ML in dronesAI/ML in drones
AI/ML in drones
 
Getting started with tensor flow datasets
Getting started with tensor flow datasets Getting started with tensor flow datasets
Getting started with tensor flow datasets
 
Using ML to make your UI tests more robust
Using ML to make your UI tests more robustUsing ML to make your UI tests more robust
Using ML to make your UI tests more robust
 
Java best practices
Java best practicesJava best practices
Java best practices
 
Counting sheep with Drones and AI
Counting sheep with Drones and AICounting sheep with Drones and AI
Counting sheep with Drones and AI
 
Android Device Labs
Android Device LabsAndroid Device Labs
Android Device Labs
 
The Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareThe Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with Ransomware
 
Agile Android
Agile AndroidAgile Android
Agile Android
 
Agile Swift
Agile SwiftAgile Swift
Agile Swift
 
Android Refactoring
Android RefactoringAndroid Refactoring
Android Refactoring
 
Agile mobile
Agile mobileAgile mobile
Agile mobile
 
From Maps to Apps the Future of Drone Technology
From Maps to Apps the Future of Drone TechnologyFrom Maps to Apps the Future of Drone Technology
From Maps to Apps the Future of Drone Technology
 
Tableau 10 and quickbooks
Tableau 10 and quickbooksTableau 10 and quickbooks
Tableau 10 and quickbooks
 
Network graphs in tableau
Network graphs in tableauNetwork graphs in tableau
Network graphs in tableau
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 

Writing Secure Mobile Apps for Drones

Editor's Notes

  1. Connect via Wifi (ssh/telnet) Using RF (Gnu Radio/ HackRF) Eagles GPS (confuse drones)
  2. Looking for the weakest link
  3. Cheap NTSC screen can sometimes pick up drone video if you’re close enough
  4. And then there’s a straightforward physical attack, whether that’s an eagle, a gun shooting it out of the air or your next door neighbors dog.
  5. Connect via Wifi (ssh/telnet) Using RF (Gnu Radio/ HackRF) Eagles GPS (confuse drones)
  6. 3dr Solo Root Password – ssh into Drone and kill processes till 3dr goes home
  7. Makezine Build a Wi-Fi Drone Disabler with Raspberry Pi
  8. Icarus box - Attacking DSMx with SDR
  9. But what I want to talk about is the last category we mentioned, namely mobile apps Manufacturer’s through their SKDs provide a whole ecosystem for developers to leverage
  10. Here’s a sample of some mobile apps, that are done by third parties using manufacturers SDKs Litchi for DJI, Solex for 3dr Solo, Precision Flight again and Skydrones for DJI They all offer something on top of DJI or 3dr Solo. There are lots of others. But I think even Litchi on it’s own has proved that there’s significant business here.
  11. So how to we create mobile apps that work with drones
  12. Put a developer before the domain name to find the web address. I’m sure there are more or look at the resources. Notable in its absence is the GoPro Karma drone.
  13. So how to we create mobile apps that work with drones
  14. There are 10 Risks but what it really boils down to are what static and dynamic information you have on the phone. By Static we mean what’s in the code – the APK or IPA – API keys etc. And by dynamic we mean what info is stored when someone uses the app. We’re also worried about the backend server, what’s in the cloud – video, images etc. - and how does it get there
  15. M2 - This covers insecure data storage and unintended data leakage. M3 – SSL – SSL IS BROKEN M5 – poor crypto – are you using symmetric keys – cos if you are someone can find them M6 – AWS again M7 – hard coding keys M9 – no obfuscation – I can see everything These are typically used together
  16. We’re talking about dynamic info here. If someone backs up your app on their phone they can see information similar to the above. Lots of databases, cached files and shared preferences. Be careful what you put here. Don’t put anything sensitive.
  17. We’re talking about dynamic info here. If someone backs up your app on their phone they can see information similar to the above. Lots of databases, cached files and shared preferences. Be careful what you put here. Don’t put anything sensitive.
  18. M2 - This covers insecure data storage and unintended data leakage. M3 – SSL – WHY IS SSL BROKEN M5 – poor crypto M6 – AWS M7 – hard coding keys M9 – no obfuscation – I can see everything These are typically used together
  19. We’re not listening to people in a coffee shop. We’re listening to the traffic from the phone to the back end server to see if we can hack the back end server.
  20. Talk about all the calls. SSL works using certificates, certificates are created by certificate authorities or CAs. Some years ago hackers stole root certificated from a CA and can now allow anyone to pretend to be someone they are not. Which means that SSL is broken and unless you take steps to fix it your https request and responses can be seen.
  21. This is an example from an old Delta app. Nothing to do with drones. But the point is still the same. If you’re going to encrypt your user data then make sure you’re not using symmetric keys. In other words you’re not putting the key in the iPhone or Android code as hackers will get it. Use asymmetric or public – private keys and leave the encryption key on the server.
  22. Finding where the data goes is usually just the first part of the hack. We can then look at the code and insecure data storage to gain access to the back end server. In this case we’re using the shared prefs data and the source code to get videos and images from where they’re stored on Amazon. Using a brute force attack you can guess the id’s for other users and see their videos too.
  23. Showing the precision flight app, using a tool called Jadx to reverse engineer the code. Much easier to see on Android than iOS.
  24. Litchi app is obfuscated so it’s harder to see.
  25. Works on iOS 10.2.x
  26. So how to we create mobile apps that work with drones
  27. So how to we create mobile apps that work with drones
  28. Apple are offering huge bug bounties which will disincetivse Pangu and the like to produce tools for Jailbreaking phones They’re much more likely to submit a bug bounty to Apple
  29. In the past we’ve had jadx, jd-gui, charles proxy that can decomoile or proxy apps. But there are new apps like Frida which will open up your app at the code level.
  30. So how to we create mobile apps that work with drones