Media

WarDragon WiFi + BT Type Drone Remote ID Detection/Decoding WIP (Sniffle/DroneID Repo)

In this video, I showcase the WarDragon in action using the new open-source repo, DroneID https://github.com/bkerler/DroneID

This repo builds upon previous videos covering the detection and decoding of FAA Remote ...
ID, specifically aligned with the ASTM F3411-22a specification.

The DroneID repo, not to be confused with DJI DroneID, enhances the capabilities of Bluetooth-based detection (thanks to the Sniffle fork from the same developer) by adding Wi-Fi-based detection to the mix.

One of the key improvements is the split in the ZMQ flow. Now, both the Wi-Fi and Bluetooth detectors operate independently, each providing ZMQ server output, while the decoding process has been broken out into its own application. This separate decoder subscribes to both inputs, decodes the data, and outputs the results through another ZMQ server.

In this video, I demonstrate a Bluetooth transmitter being detected, passed through the decoder, and successfully decoded. Additionally, I show how an internal Wi-Fi card in monitor mode can detect and decode a spoofed Wi-Fi Remote ID packet.

Explore the repo and stay tuned as I continue to push the boundaries of Remote ID detection! I should note that some of the tweaks I made to the code in this video has already been corrected.

WarDragon available here (when in stock): https://cemaxecuter.com/?post_type=product

Don’t miss out on staying connected: Catch updates on Twitter: https://twitter.com/cemaxecuter

Supporting the channel: If you find this content helpful, please consider supporting the channel through Patreon: https://www.patreon.com/cemaxecuter
[+] Show More
1 of 25