HackDig : Dig high-quality web security articles for hacker

Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

2015-08-11 06:00

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks.

David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by landing atop buildings and probing for cracks in the internal networks.

An Aerial Assault drone is displayed during a Def Con hacker gathering August 9, 2015 in Las Vegas.  The Aerial Assault drone can land atop buildings or hover outside walls and hunt for ways to break into computer networks through wireless connections.      AFP PHOTO /  GLENN CHAPMAN

An Aerial Assault drone is displayed during a Def Con hacker gathering August 9, 2015 in Las Vegas. The Aerial Assault drone can land atop buildings or hover outside walls and hunt for ways to break into computer networks through wireless connections. AFP PHOTO / GLENN CHAPMAN

According to Jordan this drone is unique,

“There has never been this capability before,” Jordan said as he showed the drone to AFP.

The drone was equipped any kind of hacking software used by hackers in penetration testing, it is able to discover vulnerabilities in the target network and exploit it.

The Aerial Assault drone scans for unsecured wireless connections to networks, as explained by Jordan, assessing weaknesses of computer networks and tracking the GPS coordinates of a target.

The Aerial Assault drone is available for sale at a price of $2,500 each.

Pierluigi Paganini

(Security Affairs – Aerial Assault drone, hacking)

The post Aerial Assault Drone, the new Hacking Weapon presented at the Defcon appeared first on Security Affairs.


Source: lmth.enord-tluassa-lairea/gnikcah/56293/sserpdrow/oc.sriaffaytiruces

“Aerial Assault Drone, the new Hacking Weapon presented at the Defcon”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud