http://opdz3nfh6n54ndhle4nkcbecn7ozfuowm5c6hlclvhcwndeg3tr5vrqd.onion/125-2/index.html
However, to access the compromised account on the DJI mobile apps, attackers have to first intercept the Mobile application traffic after bypassing its implementation of SSL pinning by performing man-in-the-middle (MitM) attack to the DJI server using Burp Suite. “ We also carried out further research and found that by parsing flight logs files we can get much more information such as location and angle of every picture taken during the drone’s flight, the drone’s home location, last known...