It is no where near the true practice of deviation as it is leveraging the WiFi aspect of this and potentially applicable to many other wifi drones. ![]() Which can be programmed through Arduino-IDE and using a FTDI serial adaptor or there are cheap usb programming devices designed for these modules. Right I've begin playing with using the PPM output of my Devo 7E controller and using a simple and very cheap ESP8266 module the ESP-01S. Also noted that there are Data pins on the PCB so serial connection may be possible but I don't think silverware is compatible. But I guess a lot depends on the firmware. Also found a github using the nrf24l01 module in the multiprotocol TX project to control the Global Drone GW008 which apparently has the same chip. This chip has flagged up at least one deviation thread with the DM002 Protocol which seems to have the same chip and seems to have had success with the nrf24l01 module. I can connect to a Telnet on the drone but haven't got the login details as yet. The TX has the NXS1040V which doesn't appear currently anywhere but the Drone seems to be based around the PAN159CY which is listed as "Panchip PAN159CY Soc2.4ghz High speed Wireless transceiver single chip microcomputer QFN40" which I think is running a skinny version of linux. I have opened them up tonight and managed to get chip ID's for the TX and Drone. It may well still use the same packet structure just missing some of the SSID header info and the receiver looks out for both. I think my assumption that the TX also joins the Wifi network is wrong as I get no traffic on the wifi network from the transmitter. Please Log in or Create an account to join the conversation. I also intent to set up a wifi hotspot on my PC with the same name and see as I suspect that the remote is just sending out these packets. I am uncertain if actually joining the wifi network is necessary. And certainly I think it would open up tens of these WiFi controlled drones if it could be achieved. But I would assume that the start of the packet is pretty much fixed IP from and to so to simulate the UDP packet would be about how the binary data was written. But I don't know enough about that architecture or the way the Deviation communicates with the chip. Although I have come across a hackaday project who came up with a proof of concept library that can make an NRF2410+ generate UDP. So my current thoughts are I've ordered a wifi module to make an arduino that generates the UDP packets based on PPM input. I've just connected to it's wifi network used a very simple UDP packet sender from my phone and sent the hex digits "66 80 80 80 80 01 01 99" and it went into launch mode (I was hanging onto it). So it looks like the phone is just blasting out UDP datagrams with roll, pitch, thottle info every few fractions of a second and the drone acts accordingly. Which led me to another article and this guy has done all the hard work.ī/hacking-chinese-drones-for-fun-and-no-profit/ The drone locks itself onto an IP of 192.168.0.1īut all the lewei_cmd protocols I think are sending video info. Tried doing some packet sniffing and getting a lot of Lewei_cmd which led me to a security article about how a lot of these drones are on an open network and can be stolen or information off their memory cards. ![]() And it's looking more and more as this machine sets up it's own wifi hotspot "WiFi-720P-51667B" (The final digits may be drone specific) and you can use the JY-UFO and many many other spin off wifi drone control apps designed for other drones that signals might be going over wifi. I've been looking at this from a few different angles for a while.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |