Researchers have discovered a terrifying hacking drone that can see behind walls via Wi-Fi. This gadget is a suitable tool for spying or theft. WiFi drone is named

Drones are scary enough now, however researchers University of Waterloo Recently, they have built a drone with a scanning device for offensive use. Using a $20 drone, researchers at the University of Waterloo in Ontario have built a device that is actually a device. Aerial scan and can identify the location of every Wi-Fi connected device in your home and control them.

An Iranian researcher named Ali Abedi and his colleague Deepak Vasisht recently presented their findings in the 28th Annual International Conference on Mobile Computing and Networking have presented this new creation Wi-Peep drone It has been called a deceptive name for a project with such dire consequences.

about Wow, Pip Accusations have been made by some researchers in this field. “Invasion of privacy and disclosure of people’s location” are such accusations. Researchers claim, this device can manipulate the data of WiFi networks and use it for “espionageOr in better words, use the approximate location of devices through its sneaky scan.

Read more: sending drugs using drones; Technology at the service of criminals!

How Wi-Pip drone works

Researchers say that this drone from IEEE 802.11 security flaws exploits This security flaw is actually caused by an old wireless protocol for local networks that has a history of problems related to eavesdropping and data theft. This system uses a technique calledfly time(ToF) uses a data manipulation trick to measure the physical distance between a signal and an object.

All this is due to the existence ofSecurity loopholeIt was in most Wi-Fi networks that the researchers used this system.Public Wi-FiThey call Basically, all smart devices are ready to automatically “Communication efforts» Respond from other devices in your area, even if that network has a password.

To create this vulnerability, the drone Wi-Fi beeps a signal ToF publishes, which attempts to communicate with local devices and subsequently enables “Stealth positioning» Special devices have Wi-Fi provides in a specific building or area. The nature of the device can be assessed through information gathered from its MAC address. A MAC address is a unique identifier given to devices on a particular network. This means things like your smart TV, Amazon Echo, cell phone, laptop, or any other “smart” device will be visible to spies.

WiFi drone

Researchers have very scary scenarios about WiFi drone imagine. Abedi and Vasisht worry that a hacker armed with the device could potentially “monitor the location of occupants, security cameras, and even home intrusion sensors.” To make this clear, they imagine the following situation:

A burglar can use this information to find valuable items such as laptops and identify ideal opportunities when people are not at home or away from a certain area (for example, everyone is in the basement) by tracking smartphones or smartwatches. .

During his conference, Abedi proposed another hypothesis that this tool can be used to track the movements of guards inside the bank by tracking the location of their phone or smart watch. Likewise, a thief can identify the location and type of smart devices in a home, including security cameras, laptops, and smart TVs, to find the perfect prey to break into. Additionally, the device’s operation via a drone means it can be used quickly and remotely without much risk of the drone’s user being identified.

Abedi and Vasisht say they hope their research will lead to development Better security measures for WiFi protocols be, so that due to similar events in the future, they are not as vulnerable to attack as the current ones. “We hope our work will help design next-generation protocols,” the researchers write.

Read more:

What do you think about Wi-Pip drone? Share your thoughts with us in the comments section Technology News With duplicate follow.

Source: gizmodo

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *