Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Capture packets from OcuSync 2.0 #3

Open
robinlegrand opened this issue May 8, 2023 · 3 comments
Open

Capture packets from OcuSync 2.0 #3

robinlegrand opened this issue May 8, 2023 · 3 comments

Comments

@robinlegrand
Copy link

Hi, for a project I want to see how the OcuSync 2.0 could work for my DJI drone mini 2. I want to do some reverse engineering but I don't find any documentations to record the packet, so you think that it's possible to perform this ?

And if you have a solution, it will be a plesure to learn something.

Have a nice day,
Robin

@mefistotelis
Copy link
Collaborator

The Wireshark dissectors currently support analyzing packets sent over UART, Ethernet/Wifi and USB.
For easy route, sniff a link using one of these.

The Occusync, like Wifi, USB etc., is just a wrapper protocol for DUML packets.
Occusync uses LTE transceivers built into a SoC, so there's no way to physically tap to the line with packets. Sniffing the transmission would require software solution - logging to the SoC console and enabling capture there. When rooted, you have access to all the relevant interfaces.

But there could be a simpler way, depending on what you want to achieve- some DUML packets are likely routed to interfaces outside of the chip - this is how DJI Assistant software works. As first try, you may want to sniff and analyze this communication.

@robinlegrand
Copy link
Author

Thank you for your prompt response, by the way my final goal on this project is to take control of the drone by hacking it. But for now I just try to understand how everything works and how to perform this with a wireless connection. And if I don't succeed I will work on the capture and the exploitation of the DroneID.

I will keep update the community if I find something interesting !

@Miljoenen
Copy link

Holy thread resurrection, Batman!

How'd you get along, @robinlegrand, did you manage to hack any drones?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants