Software & Apps

Parrot Anafi Drone Reverse Engineering

In this example, we show how we reverse-engineered the communication between the Parrot Anafi consumer drone and its controller, which connects via Wi-Fi. The Parrot Anafi hosts its own Wi-Fi network, allowing the controller or a phone running the Freeflight app to connect. Our goal is to understand the signals sent by Anafi for the initiation of takeoff and landing sequences.

Test Setup

Start by connecting your PC to the Parrot Anafi’s Wi-Fi network. Next, set up an ARP spoofing attack to put your PC in a man-in-the-middle position between the drone and its controller. This can be done using tools like Ettercap, which allows your device to capture the data exchanged between the two.

The resulting test setup will look like this:

Package Analysis

Using Wireshark, we can look at the packets, which are sent during a landing and a start sequence (the image shows only a snippet):