GNU/Linux ◆ xterm-256color ◆ bash 2034 views

This recording shows a proof of concept example of how ROS 2 Nodes can be exploited from their underlying communication middleware (DDS) to send multicast communciations to arbitrary IP addresses (e.g. to a malicious server that generates continuous traffic and responses to overload the communication stack and generate unwanted traffic), which can be used to trigger reflection (or amplification) attacks.

For additional information and more tutorials, refer to the Robot Hacking Manual (RHM).