-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Capture packets from OcuSync 2.0 #3
Comments
The Wireshark dissectors currently support analyzing packets sent over UART, Ethernet/Wifi and USB. The Occusync, like Wifi, USB etc., is just a wrapper protocol for DUML packets. But there could be a simpler way, depending on what you want to achieve- some DUML packets are likely routed to interfaces outside of the chip - this is how DJI Assistant software works. As first try, you may want to sniff and analyze this communication. |
Thank you for your prompt response, by the way my final goal on this project is to take control of the drone by hacking it. But for now I just try to understand how everything works and how to perform this with a wireless connection. And if I don't succeed I will work on the capture and the exploitation of the DroneID. I will keep update the community if I find something interesting ! |
Holy thread resurrection, Batman! How'd you get along, @robinlegrand, did you manage to hack any drones? |
Hi, for a project I want to see how the OcuSync 2.0 could work for my DJI drone mini 2. I want to do some reverse engineering but I don't find any documentations to record the packet, so you think that it's possible to perform this ?
And if you have a solution, it will be a plesure to learn something.
Have a nice day,
Robin
The text was updated successfully, but these errors were encountered: