Go Back  RCU Forums > RC Airplanes > RC Jets
Reload this Page >

Complete tx take over..facts or fiction?

Community
Search
Notices
RC Jets Discuss RC jets in this forum plus rc turbines and ducted fan power systems

Complete tx take over..facts or fiction?

Thread Tools
 
Search this Thread
 
Old 10-27-2016, 08:36 AM
  #1  
basimpsn
Thread Starter
My Feedback: (5)
 
Join Date: Dec 2001
Location: Mia, FL
Posts: 2,580
Received 4 Likes on 4 Posts
Default Complete tx take over..facts or fiction?

This guy claim he can hack any DSMX system and take full control of the craft...very cool video
https://www.youtube.com/watch?v=2YjQPPc5VW4
Old 10-27-2016, 09:10 AM
  #2  
ChuckC
My Feedback: (24)
 
Join Date: Jan 2002
Location: Friendswood, TX
Posts: 654
Likes: 0
Received 1 Like on 1 Post
Default

Uh, YIKES!

It appears it was only a matter of time, or will be if the video is legit. Wow, unscrupulous people could swipe a high dollar "drone" or drive up to a jet meet and cause some kind of havoc, if flying that protocol.
Old 10-27-2016, 10:04 AM
  #3  
wfield0455
My Feedback: (7)
 
wfield0455's Avatar
 
Join Date: Sep 2005
Location: Holliston, MA
Posts: 1,299
Received 5 Likes on 4 Posts
Default

It appears to be legit from other articles I've seen discussing it. While it appears that there are no plans to offer it for sale other than perhaps to law enforcement if someone did it, then others could too, especially now that someone has pointed out this vulnerability. Looks like it would probably be difficult for Spektrum to fix as well since the fix would need to be applied to the receivers which aren't field upgradable.
Old 10-27-2016, 10:26 AM
  #4  
Thud_Driver
My Feedback: (1)
 
Thud_Driver's Avatar
 
Join Date: Dec 2001
Location: Victorville, CA,
Posts: 1,669
Likes: 0
Received 9 Likes on 7 Posts
Default

Looks like they hack (decode) the GUID number, effectively rewrite the new Tx's GUID into the Rx on the fly, an inflight rebind so to speak, and they're in.

There's been some talk about encrypting the uplink data by XPS and maybe others. Likely the way to go. Maybe possible to include via update to Tx software. Receivers might be a whole other problem.
Old 10-27-2016, 11:00 AM
  #5  
JimBrown
My Feedback: (2)
 
JimBrown's Avatar
 
Join Date: Feb 2002
Location: Rockland, ON, CANADA
Posts: 1,132
Received 1 Like on 1 Post
Default

More info in this article: http://arstechnica.com/security/2016...-in-midflight/

Note that this attack is apparently usable with any of our RC systems, according to this comment: http://arstechnica.com/security/2016...&post=32136399

...jim
Old 10-27-2016, 11:05 AM
  #6  
basimpsn
Thread Starter
My Feedback: (5)
 
Join Date: Dec 2001
Location: Mia, FL
Posts: 2,580
Received 4 Likes on 4 Posts
Default

I really can't see how you can guard against a identical copy of your tx transmission...I will be watching this closely.

"To be clear, ALL the current RC systems are vulnerable to this timing injection attack. I was the one who picked DSMX as our first target because it's the most popular system, my favourite and the one I currently use for all my drones, planes, copters, boats and cars. The attack hardware was a teensy and a cyrf6936 transceiver from my friend at 1bitsquared.com, but we could have just as easily implemented it using the same teensy and a ML2724 to attack DJI and Futaba systems. The issue is that all the RC systems from ALL the manufacturers count on frequency hopping obfuscation to "hide" their broadcasts which are easily gathered en masse and reversed with an SDR, or by using a logic analyzer on their transmitters, there is no cryptographically secure authentication layer on any of the current systems. This timing attack is not difficult, just requires some low level radio and embedded system knowledge and about $100 in parts, and is only the tip of the iceberg in the potential attacks available on current systems. Timing is the low hanging fruit that we picked to attack and demonstrate first. We have further demonstrations planned and Would be glad to talk to any manufacturer about securing their gear. Jonathan will be us in drone hijacking as a lab excercise in his CanSecWest SDR Dojo training course next March, and I highly recommend this course for anyone interested in this area. There are many places this kind of system could be used to detect drones flying in restricted areas (because the attack system can also be used as a drone detection system passively) and to take them over and make them perform controlled landings in safe areas, rather than all the crude systems proposed so far, and we have even more interesting systems, demonstrations and applications planned for future presentations, with the next one likely being at the CanSecWest conferece after Jonathan's training. An interesting side note is that you can actually use a second attack system to hijack the first hijacker, so this gets complicated very quickly."
Old 10-27-2016, 11:10 AM
  #7  
JimBrown
My Feedback: (2)
 
JimBrown's Avatar
 
Join Date: Feb 2002
Location: Rockland, ON, CANADA
Posts: 1,132
Received 1 Like on 1 Post
Default

Originally Posted by basimpsn
I really can't see how you can guard against a identical copy of your tx transmission...I will be watching this closely.
Encryption.

...jim
Old 10-27-2016, 11:40 AM
  #8  
rhklenke
My Feedback: (24)
 
rhklenke's Avatar
 
Join Date: Jun 2002
Location: Richmond, VA
Posts: 5,998
Likes: 0
Received 34 Likes on 21 Posts
Default

So the GUID on your transmitter is used to, among other things, set the hopping sequence. If you know the algorithm that is used to go from the GUID to the hopping sequence and you monitor and record the hopping sequence, you can figure out what the GUID is.

Once you know the GUID, you can duplicate the original TX's transmission and "fool" the RX into listening to you instead of the original TX.

Back in the old 72 MHz days, you could do the same thing just by turning on a TX on the same channel that a guy was already using - and we used to broadcast that on a flag on our antenna. Remember the "dial-a-crash" TX modules where you could set the channel with a screwdriver? This is a lot more work to do essentially the same thing.

As Jim suggests, you could add encryption to the data that is being sent over the link and eventually that might be added, but I don't see this as a real threat to the every-day RC flyer on 2.4. Heck if I wanted to take down an RC plane or drone on 2.4, all I'd need is a high-power 2.4 GHz analog video transmitter with settable output channels - about $150 from your local "spy camera" retailer...

Bob
Old 10-27-2016, 04:40 PM
  #9  
2walla
My Feedback: (10)
 
Join Date: Mar 2003
Location: walla walla, WA
Posts: 732
Received 0 Likes on 0 Posts
Default

This is what the fcc should be cracking down on. This type of device can only benefit those with malicious intent. At least it now offers those with big egos and dumb thimbs and excuse when they crash with a 2.4 system...
Old 10-27-2016, 04:51 PM
  #10  
TimD.
My Feedback: (207)
 
TimD.'s Avatar
 
Join Date: Dec 2001
Location: Jacksonville, FL
Posts: 755
Likes: 0
Received 13 Likes on 12 Posts
Default

Originally Posted by 2walla
This is what the fcc should be cracking down on. This type of device can only benefit those with malicious intent. At least it now offers those with big egos and dumb thimbs and excuse when they crash with a 2.4 system...
Agreed, This is all we need another reason to question what we fly. Any jerk with a $100 shelf bought attitude to destroy your multi thousand dollar plane.
Old 10-27-2016, 05:58 PM
  #11  
jofunk
 
Join Date: Mar 2009
Location: willow springs , IL
Posts: 1,215
Likes: 0
Received 25 Likes on 14 Posts
Default

So you roll up to a flying event with your new hijacking equipment and 4 things are flying, how do you figure out which one you are hijacking?
Old 10-27-2016, 06:04 PM
  #12  
TimD.
My Feedback: (207)
 
TimD.'s Avatar
 
Join Date: Dec 2001
Location: Jacksonville, FL
Posts: 755
Likes: 0
Received 13 Likes on 12 Posts
Default

Originally Posted by jofunk
So you roll up to a flying event with your new hijacking equipment and 4 things are flying, how do you figure out which one you are hijacking?
Most likely ALL go down.
Old 10-27-2016, 10:05 PM
  #13  
Birdman6310
Senior Member
 
Join Date: Sep 2015
Posts: 118
Likes: 0
Received 0 Likes on 0 Posts
Default

Very sad in my view that someone should spend time developing this sort of thing. Sounds like work to blackmail companies making RC Equipment. Go get a real job that does some good
Old 10-27-2016, 10:07 PM
  #14  
Birdman6310
Senior Member
 
Join Date: Sep 2015
Posts: 118
Likes: 0
Received 0 Likes on 0 Posts
Default

Does this still work with DSM2 ?













3
Old 10-27-2016, 10:20 PM
  #15  
Birdman6310
Senior Member
 
Join Date: Sep 2015
Posts: 118
Likes: 0
Received 0 Likes on 0 Posts
Default

This strikes me as irresponsible and stupid. Imagine some idiot takes over a plane, it crashes and kills someone, Who will get done for the potential death ?
Old 10-28-2016, 01:49 AM
  #16  
olnico
 
olnico's Avatar
 
Join Date: May 2007
Location: Houston, Texas.
Posts: 4,120
Likes: 0
Received 15 Likes on 9 Posts
Default

Well, Weatronic systems are completely immune to this.
We got audited by several military customers and selected as the only system that was not easily hackable ( GUID being encrypted, you'd need to brake the 128 bit key on the fly as the system hops. Very much impossible with today's computers ).
Old 10-28-2016, 01:44 PM
  #17  
LarsL
 
Join Date: Sep 2006
Location: Shorewood, WI
Posts: 195
Likes: 0
Received 0 Likes on 0 Posts
Default

Originally Posted by olnico
Well, Weatronic systems are completely immune to this.
We got audited by several military customers and selected as the only system that was not easily hackable ( GUID being encrypted, you'd need to brake the 128 bit key on the fly as the system hops. Very much impossible with today's computers ).
Beyond your statement that Weatronic was audited by several military customers what further facts do you have that Weatronic is completely immune as you put it?

Basimpsn, I read your entire original article as well as watched the video and you made it very clear that "ALL the current RC systems are vulnerable to this timing injection attack." How are you convinced that all systems are vulnerable?. Now that this is out, it is easy for every manufacturer except the one that you used in your demonstration, to say theirs in immune.
Old 10-28-2016, 01:51 PM
  #18  
Zeeb
My Feedback: (41)
 
Zeeb's Avatar
 
Join Date: Nov 2004
Location: St George, Utah UT
Posts: 5,686
Received 67 Likes on 54 Posts
Default

Originally Posted by olnico
Well, Weatronic systems are completely immune to this.
We got audited by several military customers and selected as the only system that was not easily hackable ( GUID being encrypted, you'd need to brake the 128 bit key on the fly as the system hops. Very much impossible with today's computers ).
That may be true but I've heard nothing from PB about changing their plans to drop the Wheatronic stuff?
Old 10-29-2016, 01:25 AM
  #19  
Halcyon66
 
Join Date: Aug 2016
Location: Gone Sailing
Posts: 459
Received 51 Likes on 40 Posts
Default

Olinio interesting that you keep pushing Weatronic they are out of business and only survived as a Turkish billionaire was backing them?? The moment he died and funding stopped they closed, pretty simple really.

Tell me one manufacturer that wouldn't keep on going if they were backed with serious $$. I had battles with them for years over the never ending production dates that never eventuated you could see that they had zero business skills.

Any system is capable of being hijacked the Iranians took a RQ-170 off the US or did you miss that, if you think toy RC systems are immune you are going to be seriously disappointed.

Regards,

Last edited by Halcyon66; 10-29-2016 at 04:54 AM.
Old 10-29-2016, 06:58 AM
  #20  
Edgar Perez
My Feedback: (13)
 
Edgar Perez's Avatar
 
Join Date: Dec 2001
Location: Gurabo, PUERTO RICO (USA)
Posts: 2,404
Received 20 Likes on 10 Posts
Default

So where all this hostility about Weatronics come from?
It unfortunate that the brand is no longer available, but the fact that it did have (and still does for those who use it), significant technical advantages over the more established brands is backed by factual information.

I'm not really concerned about begin hijacked at this time.. maybe in the future... But it don't surprise me if that it turns out that Weatronic already had another technical advantage by using encryption. It just another example of many. I do hope that the Powerbox upcoming system, based on Weatronic technology, keep and improve on the many advantages.

Last edited by Edgar Perez; 10-29-2016 at 07:23 AM.

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.