Flying FTP Server
This is Education Purposes Only
As always if you have any suggestions, comments, improvements tips, please let me know. See you all with another Article on next week.Please follow and share if you like and support.
Before coming to the main topic of this article, I would like to introduce a good source of knowledge in the cybersecurity domain. This source may not be new to most of you as you guys were in the field for a long time. But anyway I will keep a little note on this as im a huge fan of this Tech-Talk. The source is non-other than the "DEFCON conference" YouTube channel. ( As in my inner thoughts I would dying to participate to the actual conference one day😍).
![]() |
| DEFCON |
So writing about DEFCON for the new people, DEFCON is one of the world's prime and most outstanding hacker conventions, held yearly in Las Vegas, Nevada. Simply this is a place where all there Hackers (People with exceptional technical knowledge and out of the box thinking pattern) get together and show off their research works and share knowledge. If you follow the below link, you will find the YouTube channel where you can view the tech talks in most of the conference.
I am coming back to the main topic, as I have previously said Im a huge fan of DEFCON. One day I was watching DEFCON episode presented by Michael Robinson. That was subject to the exciting topic of "Knocking my neighbor's kids cruddy drone offline. ". You can find the episode y follow this link.
In his speech, he explains the process of how he had penetrated a Drone or, in other words, Unmanned aerial vehicles or Quadcopter. By the end of the first quarter through a simple NMAP scan, he discovers that there is an open FTP connection was hosted in the drone.
![]() |
| Flying FTP Server - DEFCON 23 |
Flying FTP Server
At this point, this idea pop's into my head and automatically mapped with the research area I have talked on my previous article
.
(If you haven't read the WHID article, I have written, please follow this link to read it (WHID))
(If you haven't read the WHID article, I have written, please follow this link to read it (WHID))
In that article, I was talking about the research project of WHID done by Luca Bongiorni.
When I tried his finding, I have noticed that if we do a small modification to the payload, then we can transfer the files via FTP to the FTP server in the same LAN.
![]() |
| FTP - WHID |
So Simply what attacker need to do is modify the payload to connect the FTP server that he is going to host using a drone and send the required files to it. So with out having any trace can steal data and retrieve it.
![]() |
| Attack Flow |
This is open for debate and i haven't have drone, Pineapple Wifi scanner to other tech to test the scenario. But i would love if some one can try out and get the relevant results or love to participate if some one invited to do a collaborate project on this topic.
As always if you have any suggestions, comments, improvements tips, please let me know. See you all with another Article on next week.Please follow and share if you like and support.




Comments
Post a Comment