![]() I believe that the PSH,ACK packet that the client sends to the drone is the magic packet and that the 12 bytes of data are the magic word. I need to understand how to send the same 12 bytes of data with Scapy. I used the emulator to capture several successful connections, and I notice that the captured data varies in the following ways:Ĭlient to Drone Data - Capture 1 Data (12 bytes) ![]() These are the 12 bytes that I am sending, as observed in Wireshark: Data (12 bytes) I am not sure what the significance of the digit 5 is or whether I am sending the correct 12 bytes. I omitted the last 5, and then Wireshark reported the data length as 12 bytes. Note that I originally had the value \275 as the last four characters of the string, but then Wireshark showed the data length as 13 bytes. Here is my Scapy script: from scapy.all import * Here is the capture from the scripted connection: I am using netcat to listen on port 6666, which is always the port to which the drone tries to send UDP packets, as fragmented IPv4 packets. Then, the drone immediately sends a FIN packet. I scripted a TCP connection with Scapy, and I can get as far as the last PSH,ACK packet, from the client to the server (drone). the client sends a PSH,ACK packet with 12 bytes of data.the client increments the ACK number by 20.I ran the app on an Android emulator on the computer, and I sniffed the following traffic: The drone runs a wifi access point for video and photo control through a mobile app (the flight controller uses a separate 2.4 GHz signal). I am trying to initiate a stream of video data from my drone to my computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |