Skip to content

smaccm/vm_hack

Repository files navigation

Demo

In this demo the TK1 is loaded with deliberately misconfigured software. This allows the VM to break off communication with the legitimate ground control station (GCS) and turn over control to a rogue GCS. This demonstrates how a very small flaw can lead to complete loss of the system.

Setup

  1. Set up a legitimate GCS using the default software.

  2. Configure a rogue GCS: set up a normal GCS, but modify smaccmpilot-stm32f4/src/smaccm-flight/keys.conf to the following:

[symmetric_key.server_to_client]
keysalt = [ 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 0, 0, 0, 0, 0, 0, 0, 0 ]

[symmetric_key.client_to_server]
keysalt = [ 24, 23, 22, 21, 20, 19, 18, 17, 16, 15, 14, 13, 12, 11, 10, 9, 0, 0, 0, 0, 0, 0, 0, 0 ]
  1. Boot the TK1 using the image vm-hack-tk1-image.

  2. Have this repository checked out in the TK1 VM.

Running the demo

  1. Run the TK1 and the legitimate GCS as normal. Demonstrate that the legitimate GCS has control of the TK1.

  2. ssh into the VM, go into the repository for this demo and execute ./attack.sh. If you just want a quick hack without the graphics, run make hack.

  3. Demonstrate that the legitimate GCS has lost control of the TK1.

  4. Connect the rogue GCS (swap cables or 3DR radios).

  5. Demonstrate that the rogue GCS has control of the TK1.

  6. You can reset by doing make unhack and restarting the legitimate GCS.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published