This project is licensed under the MIT License.
The following files are licensed under the Apache License 2.0: opendroneid-dissector.lua
For more details, see the LICENSE files included in this repository. https://github.com/opendroneid/wireshark-dissector
This project processes Remote ID (RID) data from drones and sends it as Cursor on Target (CoT) messages to a TAK server. It integrates with the Sniffle tool to capture Bluetooth packets.
- Python 3.6 or later
- Wireshark and TShark
mkfifo
utilitysniff_receiver
from the Sniffle repository
git clone https://github.com/yourusername/RIDtoTAK.git
cd RIDtoTAK
In a separate terminal window, create a FIFO for the drone PCAP:
mkfifo /tmp/drone_pcap
In another terminal window, clone the Sniffle repository and run the sniff_receiver
tool:
git clone https://github.com/nccgroup/Sniffle.git
cd Sniffle/python_cli
./sniff_receiver -l -e -o /tmp/drone_pcap
Back in the RIDtoTAK
directory, run the RIDtoTAK script. Adjust the --tak-host
, --tak-port
, and --fifo-pcap-path
parameters as needed:
python3 RIDtoTAK.py --tak-host 0.0.0.0 --tak-port 8054 --update-interval 5 --fifo-pcap-path /tmp/drone_pcap
--tak-host
: TAK server hostname or IP address.--tak-port
: TAK server port.--update-interval
: Interval in seconds for CoT message updates.--fifo-pcap-path
: Path to the FIFO PCAP file.
python3 RIDtoTAK.py --tak-host 192.168.1.100 --tak-port 8087 --update-interval 10 --fifo-pcap-path /tmp/drone_pcap