As we all know that a drone, in a technological context, is an unmanned aircraft, formally which is known as unmanned aerial vehicles. Recently a robot expert at the U.S. company known as Aerial Assault David Jordan has unveiled an unmanned flying vehicle at the Defcon hacking conference which steals data just by floating above you.
This Drone Steals Data Just By floating Above You[dropcap]Formally[/dropcap] drones are more known as unmanned aerial vehicles or a flying robot and generally this drones or flying robots are remotely controlled or can fly autonomously through software-controlled flight plans in their embedded systems working in conjunction with GPS.
Recently an unmanned flying vehicle is currently available to be purchased to anybody who prepares to pay the amount of $2,500 for the capability to appraise the Internet networks and hand-off the subtle elements back to the robot’s proprietor. So, it is a very good news for the hackers who really want to invade the Internet networks in the out of reach areas.
A robot expert at the U.S. company known as Aerial Assault David Jordan has unveiled an unmanned flying vehicle at the Defcon hacking conference in Las Vegas. The robot expert David Jordan has equipped his unmanned flying drone with a collection of software tools which is capable of performing penetration testing used by the hackers and security researchers looking for the weaknesses in computer networks.
The robot expert David Jordan said that “This unmanned flying drone which is also known as “Aerial Assault drone” uses the collection of software tools to scan all the unsecured networks, hence, it records all the gathered information and send it back to its owner along with the exact GPS coordinates”.
Moreover, the robot expert at the U.S. company known as Aerial Assault David Jordan also told that “There has never been this capability before”.
The open source technology which was used by the robot expert David Jordan to built his Aerial Assault drone makes it very easier for the hackers and the security researchers to customise the Aerial Assault drone in the way they want. As the Aerial Assault drone uses its own WiFi signal hence it enables its owners to trick laptops, phones and other devices in an area to connect to the drone rather than a trusted network which passes the data and information like credit card numbers, banking information, and other personal details.