Satterfield stated that the hacking can be done by exploiting the Parrot A.R.
drones built-in Wi-Fi and an open telnet port on the drones implementation of theBusyBoxreal-time operating system.
What is alarming is that the procedure is does not require any sophisticated tools or expert knowledge.
One of Parrot drones particularly vulnerable to attacks is the Bebop model.
He presented his research on the Bebop drone in a session entitled Knocking My Neighbors Kids Cruddy Drone Offline.
Like Satterfield, Robinson found that there was an open telnet port on the Bebop.
This open telnet port can be exploited by hackers to take over the Bebop drone.
source: www.techworm.net