@coreysnipes
We bring a simple 'table top' #UAS.
1. #UAV : A #BeagleBone Blue attached to a quad frame running either #ArduPilot or #PX4. We exploit network services and misconfigured firmware update
2. #GCS : Android phone and gamepad joystick controller running #QGroundControl. We exploit vulnerable apps on the phone.
3. COMMS: WiFi via the BB-Blue access point. We crack the #WiFi password and sniff #MAVLink off the air
The subtext is to demonstrate vulns in each of these subsystems and how you can use those to pivot from one to another.
Our audiences have varied from vendor sales and mgmt at Xponential to more technically mixed folks at BlackHat. Gonna be challenged to make it interesting for the technical audience at #PX4. But many UAS software engineers haven't really been exposed to how cybersecurity folks think and test, so I hope they find that fun.