Skip to main content
Dark Wolf Hack Our Drone Workshop - Ronald Broberg & Rudy Mendoza - DCSG2026
Dark Wolf Hack Our Drone Workshop - Ronald Broberg & Rudy Mendoza - DCSG2026

Dark Wolf Hack Our Drone Workshop - Ronald Broberg & Rudy Mendoza - DCSG2026

Name of Training: Dark Wolf Hack Our Drone Workshop
Trainer(s): Ronald Broberg and Rudy Mendoza
Dates: April 26-27, 2026
Time: TBD
Venue: Marina Bay Sands
Early Bird Cost (GST included): $2,287 USD / equivalent to $2,950 SGD / Proficiency Exam Add-on $450 SGD

Early bird price valid until February 8, 2026.

Short Summary:

The Dark Wolf Hack Our Drone Workshop provides students with hands-on cyber testing of Unmanned Aerial Vehicle (UAV), Ground Control Station (GCS), Android controller, and Radio Frequency (RF) Communications. Students will learn the tools, techniques, and procedures used in cybersecurity testing of Unmanned Autonomous Systems (UAS)

Course Description: 

The recent expansion of Uncrewed Autonomous Systems (UAS) across various sectors presents significant security challenges, as rapid adoption often outpaces critical cybersecurity security engineering, leaving many of these systems vulnerable. The Dark Wolf Hacking Our Drone Workshop provides participants a comprehensive, hands-on understanding of drone security vulnerabilities and the techniques to assess and mitigate them. This intensive two-day program offers a deep dive into drone hacking, equipping cyber professionals with the practical skills and theoretical knowledge necessary to evaluate and secure autonomous systems.

The curriculum spans the UAS architecture and includes an Unmanned Aerial Vehicle (UAV), a Ground Control Station (GCS) system, RF communication protocols, payloads, and log analysis. Through a combination of expert-led instruction and extensive practical lab exercises, participants will gain proficiency in identifying, exploiting, and reporting vulnerabilities across these diverse components. The workshop concludes with a focus on risk assessment, mitigation strategies, and industry best practices for securing drone operations, ensuring attendees leave equipped to proactively identify and secure autonomous systems against evolving cyber threats.

Course Outline:

  • UAV - Drone
    • UAS Cybersecurity (presentation)
      • Attack Surface (activity)
    • UAV Hardware, Software, Cybersecurity (presentation)
      • UAV Firmware Analysis (lab)
    • UAV Flight Controllers (presentation)
      • QGround Control and Mission Planning (lab)
  • Ground Control
    • Introduction to Android Cybersecurity  (presentation)
      • Android GCS Application Analysis (lab)
    • GCS Hardware, Software, Cybersecurity (presentation)
      • GCS Exploitation (lab)
  • Radio Frequency Communications
    • UAS RF Communications - Telemetry, Video, GPS, ADS-B (presentation)
      • Cracking Wireless Communications (lab)
    • DroneID (presentation)
      • RemoteID (lab)
    • SiK Telemetry Radios (presentation)
      • SiK Radio Hacks (lab)
    • MAVLink Telemetry for Command and Control
      • MAVLink Sniffing and Spoofing (lab)
  • Payloads and Logging
    • UAV Cameras - Digital and Analog (presentation)
      • Analog Video Transmission Sniffing (lab)
    • UAS Logging (presentation)
      • Adversarial Forensics on UAS Logs (lab)
    • UAS Cybersecurity Review (presentation)

Difficulty Level:

Beginner/Intermediate

Students should be comfortable with the Linux command line.

While the skills and techniques are not particularly advanced, few individuals are comfortable taking cybersecurity and pentesting skills and applying them to drones. That is why our course emphasizes hands-on labs and encourages our students to physically access UAS devices and payloads.

A foundational understanding of drones, network security, or embedded systems will enhance a student's engagement with the course content. To facilitate learning for all attendees, thorough lab manuals will be supplied, effectively addressing any prerequisite knowledge differentials.

Beginner Definition - The student has an interest in the topic presented and general technology knowledge that a power user or undergraduate student may have acquired.

Intermediate Definition - The student has education and some experience in the field and familiarity with the topic being presented. The student has foundational knowledge that the course will leverage to provide practical skills on the topic.

Suggested Prerequisites:

Students should be comfortable with the Linux command line. Lab documents will be provided to help guide students through the command line exercises.

What Students Should Bring:

Students should bring a laptop with the following installed:

  1. Docker
  2. VirtualBox

What the Trainer Will Provide:

The Dark Wolf Drone Hacking Workshop will provide:

  • A UAS Lab Kit to include:

    • UAV with flight computer and firmware

    • UAV Payload

    • GCS hand controller with firmware

    • Android phone with GCS Application

    • HackRF One Software Defined Radio (SDR)

    • USB Wifi Dongle

    • USB Bluetooth Dongle

    • Toolkit

    • Cable Kit

    • Preconfigured Virtual Machine images for installation on student computer

This UAV kit uses benchtop power and does not provide or require lithium batteries.

Trainer(s) Bio:

Ronald Broberg is a cybersecurity principal at Dark Wolf where he tests Drones, Phones, and Radios. Previously, he worked as a cybersecurity engineer with Lockheed Martin in the Space and C2 domains.

Rudy Mendoza is a cybersecurity principal at Dark Wolf where he performs penetration testing against various networks and targets including UAS. He is the primary author of the Dark Wolf Drone Security Testing Playbook and is co-authoring a book on UAS cybersecurity testing.

Proficiency Exam Option:

This course has the option for a proficiency certificate add-on. To earn the proficiency certificate, students will complete testing against a completely virtualized drone, using the TTPs demonstrated in this course.

Please reach out to training@defcon.org for any questions related to the proficiency exam and certificate option.

Registration Terms and Conditions: 

Trainings are refundable before March 27, 2026, minus a non-refundable processing fee of $250.

Between March 27, 2026 and April 21, 2026 partial refunds will be granted, equal to 50% of the course fee minus a processing fee of $250.

All trainings are non-refundable after April 21, 2026.

Training tickets may be transferred to another student. Please email us at training@defcon.org for specifics.

If a training does not reach the minimum registration requirement, it may be cancelled. In the event the training you choose is cancelled, you will be provided the option of receiving a full refund or transferring to another training (subject to availability).

Failure to attend the training without prior written notification will be considered a no-show. No refund will be given.

DEF CON Training may share student contact information, including names and emails, with the course instructor(s) to facilitate sharing of pre-work and course instructions. Instructors are required to safeguard this information and provide appropriate protection so that it is kept private. Instructors may not use student information outside the delivery of this course without the permission of the student.

By purchasing this ticket you agree to abide by the DEF CON Training Code of Conduct and the registration terms and conditions listed above.

Several breaks will be included throughout the day. Please note that food is not included.

All courses come with a certificate of completion, contingent upon attendance at all course sessions. Some courses offer an option to upgrade to a certificate of proficiency, which requires an additional purchase and sufficient performance on an end-of-course evaluation.

 

$2,287.00