Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Black Hat

Aerial Assault Drone is Armed with Hacking Weapons

Las Vegas – Hackers’ arsenal on Sunday was beefed up with a drone armed with weapons to crack into wireless computer networks at close range, whether they be in skyscrapers or walled compounds.

Las Vegas – Hackers’ arsenal on Sunday was beefed up with a drone armed with weapons to crack into wireless computer networks at close range, whether they be in skyscrapers or walled compounds.

David Jordan of US-based Aerial Assault was at an infamous Def Con hacker gathering showing off a drone that could be dispatched on missions to land atop buildings or hover outside walls and probe for cracks in computer networks.

“There has never been this capability before,” Jordan said as he showed the drone to AFP.

The drone was equipped with software tools used to perform the kind of “penetration testing” done by hackers or computer security professionals who seek vulnerabilities in computer networks.

As with drones previously launched by hackers, the Aerial Assault model scans for unsecured wireless connections to networks, according to Jordan.

Along with assessing weaknesses of networks, the drone logs precise GPS coordinates of a target and takes all the information back to its handler, he said.

Aerial Assault drones were for sale, at a price of $2,500 each.

Hackers at Def Con early on turned to drones for sniffing out unprotected wireless Internet networks, but capabilities Jordan said were built into the Aerial Assault drone raised the ante with automated tools that could be flown past physical defenses.

Written By

AFP 2023

Click to comment

Expert Insights

Related Content

Black Hat

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world...

Black Hat

LAS VEGAS – The security industry makes its annual pilgrimage to the hot Sonoran desert this week for skills training, hacking demos, research presentations...

Black Hat

Bypassing Air Gap Security: Malware Uses Radio Frequencies to Steal Data from Isolated Computers 

Black Hat

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last...

Black Hat

Sin City, A.K.A Las Vegas, Nevada – is once again playing host this week to the Black Hat and DEFCON security conferences. With throngs...

Application Security

As the year comes to a close, we thought it would be appropriate to highlight some of the best stories and columns for 2010....

Application Security

Hackers breached the systems of anti-adblocking solutions provider PageFair and used the access to deliver malware via the publishers that rely on the company’s...