Reverse Engineering Asked on June 15, 2021
My goal is to control my drone with my raspberry pi using python and not the app that is being delivered together with it.
First I connected the app to the drone, flew and used aircrack-ng to get the pcap.
I looked at it in wireshark and could not make sense of it.
I presume it to be unencrypted UDP though.
So I decompiled the java apk with APK Studio and looked at the source code.
I looked for a random button in an xml to find the corresponding method in a java file.
It did not exist.
There are some smali files.
Which approach do you suggest for reverse engineering it?
If it's a drone, it's probably MAVLink. Check that first. https://mavlink.io/en/guide/serialization.html
Answered by pythonpython on June 15, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP