System Overview
Signal Monitor
Capabilities
Target Drone — DJI Tello
Identified Vulnerabilities
Countermeasure Methods Used
land / emergency to 192.168.10.1:8889 after associating with open AP0x00000167 (SPS — Sequence Parameter Set, defines profile/level), 0x00000168 (PPS — Picture Parameter Set, defines encoding parameters), and 0x00000165 (IDR keyframe — Instantaneous Decoding Refresh).
⚠ Outcome: Reassembly of a coherent video feed proved difficult. Each video frame was heavily fragmented across multiple 802.11 data frames with no consistent ordering or sequence numbering recoverable at the capture layer. Without being associated to the AP, the full UDP session context (source port, RTP-style sequencing) was not easily reconstructable, causing NAL units to be received out of order or partially. The H.264 decoder (ffmpeg) was unable to consistently reconstruct frames, producing corrupted output or stalling on missing IDR keyframes.
► Status: One frame was partially recovered — the top portion of the frame was viewable, but the remainder was corrupted. Full frame reconstruction off-network remains unreliable due to fragmentation and missing sequence context.
Cat Image Injection: A JPEG or PNG image is pre-encoded to a single H.264 frame via ffmpeg at startup. Pressing
c in the live menu replaces the real video feed with the cat frame for 5 seconds before transparently resuming normal relay — the phone's DJI app sees a seamless stream throughout.
► Status: Fully operational. Phone connects to fake AP, drone remains flyable via relay, image injection confirmed working.
Hardware Components
System Architecture
Software Modules
Dependencies
Target Frequencies
| Band | Frequency | Target Use | Priority |
|---|
TX Gain Reference
Evil Twin — Rogue AP + Tello Relay
hostapd on a USB WiFi adapter. The Raspberry Pi's built-in adapter remains connected to the real Tello drone. Two background threads transparently bridge all traffic between the phone and the drone — making the drone fully flyable through the fake AP while giving full interception capability.
Network Architecture
Fake AP (hostapd)
cmd + video
Real Tello AP
192.168.10.1
.jpg / .png
encode to H.264
port 11111
Setup Requirements
Operation Flow
Project Summary
Signal Reaper is a portable, self-contained RF countermeasure platform built on Raspberry Pi and HackRF One SDR hardware.
The system is operated entirely through a custom Python curses TUI, navigated via physical GPIO buttons — no keyboard required in the field.
The primary test target was a DJI Tello drone. Its open WiFi control network, unencrypted UDP command protocol, and single-band 2.4 GHz dependency make it highly susceptible to multiple attack vectors implemented in this system.
The HackRF One connected to a Yagi antenna and RF amplifier provides broadband noise jamming across the Tello's 2.4 GHz control frequency, causing immediate disconnection from the DJI mobile app.
The Evil Twin module clones the Tello's AP using hostapd on a USB WiFi adapter, while the Pi's built-in adapter stays connected to the real drone. Two relay threads transparently bridge UDP commands and H.264 video — making the drone fully flyable through the fake AP. A pre-encoded cat image frame can be injected into the live video feed on demand via a single keypress.
Powered by a LiPo battery, the complete system is fully field-deployable with no external power or network infrastructure required.
Legal Disclaimer
RF jamming is illegal in most jurisdictions including Ireland, the EU, and the US under telecommunications law. Unauthorised network attacks violate the Computer Misuse Act, GDPR, and various other statutes.
This system was developed and tested ONLY on hardware owned by the builder in a controlled private environment. The author assumes zero liability for any misuse of this software, firmware, or hardware configuration.
DO NOT USE THIS SYSTEM IN PUBLIC AIRSPACE OR ON ANY DEVICE YOU DO NOT OWN.