{"version":"1.0","provider_name":"HITB (in)Cyber 2024 - Abu Dhabi","provider_url":"https:\/\/conference.hitb.org\/hitbincyber2024","title":"HITB LAB: Build Your Own Drone Attacking Device - HITB (in)Cyber 2024 - Abu Dhabi","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qxaT5HucmH\"><a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/session\/hitb-lab-build-your-own-drone-attacking-device\/\">HITB LAB: Build Your Own Drone Attacking Device<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/conference.hitb.org\/hitbincyber2024\/session\/hitb-lab-build-your-own-drone-attacking-device\/embed\/#?secret=qxaT5HucmH\" width=\"600\" height=\"338\" title=\"&#8220;HITB LAB: Build Your Own Drone Attacking Device&#8221; &#8212; HITB (in)Cyber 2024 - Abu Dhabi\" data-secret=\"qxaT5HucmH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"This is a two hrs intensive workshop about building a device to attack consumer drones.\u00a0 It includes the common attack vectors from internal to external and modules on understanding drone signals. Attack Vectors (common methods for drone hacking) Firmware \u2013 modify or obfuscate the firmware Applications \u2013 hijacking of the mobile devices or mal-application Radio [&hellip;]"}