Aerial Assault drone is armed with hacking weapons

An Aerial Assault drone is displayed during a Def Con hacker gathering in Las Vegas, Nevada, on August 9, 2015
An Aerial Assault drone is displayed during a Def Con hacker gathering in Las Vegas, Nevada, on August 9, 2015

Hackers' arsenal was beefed up with a drone armed with weapons to crack into wireless computer networks at close range, whether they be in skyscrapers or walled compounds.

David Jordan of US-based Aerial Assault was at an infamous Def Con hacker gathering on Sunday, showing off a drone that could be dispatched on missions to land atop buildings or hover outside walls and probe for cracks in computer networks.

"There has never been this capability before," Jordan said as he showed the drone to AFP.

The drone was equipped with software tools used to perform the kind of "penetration testing" done by or computer security professionals who seek vulnerabilities in .

As with previously launched by hackers, the Aerial Assault model scans for unsecured wireless connections to networks, according to Jordan.

Along with assessing weaknesses of networks, the drone logs precise GPS coordinates of a target and takes all the information back to its handler, he said.

Aerial Assault drones were for sale, at a price of $2,500 each.

David Jordan displays an Aerial Assault drone during a Def Con hacker gathering in Las Vegas, Nevada, on August 9, 2015
David Jordan displays an Aerial Assault drone during a Def Con hacker gathering in Las Vegas, Nevada, on August 9, 2015

Hackers at Def Con early on turned to drones for sniffing out unprotected wireless Internet networks, but capabilities Jordan said were built into the Aerial Assault drone raised the ante with automated tools that could be flown past physical defenses.


Explore further

Chinese company limits US drone use after White House crash

© 2015 AFP

Citation: Aerial Assault drone is armed with hacking weapons (2015, August 10) retrieved 16 July 2019 from https://phys.org/news/2015-08-aerial-assault-drone-armed-hacking.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
151 shares

Feedback to editors

User comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more