12.04.2013 Views

Aircraft Hacking

Aircraft Hacking

Aircraft Hacking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Aircraft</strong> Post-exploitation<br />

✈ <strong>Aircraft</strong> and Pilots<br />

» Predictables<br />

» Checklists and procedures<br />

✈ Exploiting other comm<br />

and nav systems or<br />

protocols<br />

✈ Planning and timing!<br />

✈ C&C<br />

» Two way communication<br />

» Actions<br />

» Limitations<br />

© 2013, n.runs Professionals - Security Research Team - April 2013 Hugo Teso

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!