TransWikia.com

On reverse engineering an udp protocol to control a drone

Reverse Engineering Asked on June 15, 2021

My goal is to control my drone with my raspberry pi using python and not the app that is being delivered together with it.

First I connected the app to the drone, flew and used aircrack-ng to get the pcap.

I looked at it in wireshark and could not make sense of it.

I presume it to be unencrypted UDP though.

So I decompiled the java apk with APK Studio and looked at the source code.

I looked for a random button in an xml to find the corresponding method in a java file.

It did not exist.

There are some smali files.

Which approach do you suggest for reverse engineering it?

One Answer

If it's a drone, it's probably MAVLink. Check that first. https://mavlink.io/en/guide/serialization.html

Answered by pythonpython on June 15, 2021

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP