ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Security and vulnerability of UAVs

(2021)

Files

LECHANTRE_94411800_2021.pdf
  • Closed access
  • Adobe PDF
  • 7.8 MB

Details

Supervisors
Faculty
Degree label
Abstract
Drones are now being bought more and more by privates or customers in the past few years. Depending of their size or purpose, they can be cheap or expensive. As the new customers might not be the most passionate for differents reasons, they will certainly not buy the most expensive one, but rather the cheapest one around hundred euros. This is understandable, the marketting around those drones are well made: for a few hundred bucks, the drone can be controlled by your phone via WiFi, have a live streaming video camera and can have many more options. Who wouldn’t want to buy that for pleasing their son or another reason ? However, as the drones are cheap, it comes with another price: the security might be seriously overlooked by manufacturers. And a more important question comes to mind: what if a hacker attempts to break into the drone for malicious purpose ? The reasons why an attacker would want to attack a drone are vast. Curiosity, stealing the drone, just having a look on the camera, or the simple reason: why not ? In this thesis, the security analysis of two drones will be presented, and we will discover ourself if the concern corresponding to the problematic is legitimate. First, the chapter one will present you what is a drone, what can it do and how can it be controlled. In the fol- lowing chapter, the state-of-art will show you different approaches where some hacker can successfully break into the drone. Then, with all the knowledge acquired from the previous chapters, you will dive into the world of drone pentesting, where my work will be presented. In the two last chapters, by seeing my results and exploitations, we will finally discover if the questions asked earlier are legitimate. Is the security of the cheapest drones is that overlooked by manufacturers, and if so, what can an attacker do ?