RAS Drone Division- Drone on the roof

FLYING PENETRATION TOOLS PRESENT NEW CHALLENGES

Internet protocol penetration tools such as Kali Linux are used by security professionals to asses wireless network security and ability to withstand unauthorized access attempts. These same tools are also used by criminal hackers to gain access to wireless networks to steal intellectual property and personal information or place payload programs designed to monitor or corrupt computer systems.

Now, hardware running penetration software is small enough to be fitted onto drones that can land on rooftops to perform criminal hacking. Although battery power of most small drones is limited to approximately fifteen minutes of flight time, a drone can sit unnoticed for days making penetration attempts and collecting information while saving enough power for a flight home.

COUNTER SOLUTIONS

  • RAS constantly researches and investigates emerging drone threats to provide timely information to our clients.
  • Our electronics experts understand drone technology to the component level and help our clients make informed decisions.
  • We maintain vetted relationships with the top C-UAS vendors worldwide insuring that the solutions we present are state of the art.
  • Contact RAS to evaluate your company’s rooftop vulnerabilities.

Leave a Reply

See All Posts
How can we help you?

Reach out for an informal discussion, assessment or proposal.  We’re ready to serve.

RAS did a fantastic of job of guiding CLC through the complicated decisions we had to make in order to strike just the right balance, promoting both employee safety and a welcoming work space for our staff and clients. Ryan was quick to respond to all of our questions and delivered exactly what was promised.

Leslie Starr Heimov
Executive Director, CLC
Facebook
LinkedIn