Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

How to Hack Wireless Remotes with Radio Replay Attacks - Hak5 1909

Автор: Hak5

Загружено: 2015-10-16

Просмотров: 80325

Описание:

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Today we're hacking wireless remotes using RF replay attacks using the YARD Stick One!

Full show notes at http://hak5.org -- Wireless Gear including the YARD Stick One at http://hakshop.com

In this episode we cover:

How to gather intel on the device you want to hack
How to sniff its wireless signals
Determining modulation
Decode OOK signals
Transmitting a Replay Attack with RfCat and the YARD Stick One

Step 1: Gathering Intel

First up we need to identify the device we're going to hack and figure out as much about it as possible. Thankfully in the US this is made easy by the FCC. In our demo we're using this remote control power outlet. It's a cheap simple $10 device that you can get off Amazon with the FCC ID PAGTR-009-1B.

http://amzn.to/1PejY58
https://fccid.io/document.php?id=1729526

Here we can see it's originally manufactured by Verdant Electronics (Dong Guan) Co., Ltd. out of China and if we pull up the actual test report from the lab we'll figure out that it transmits at 314.9020 MHz using ASK modulation with 80 kHz of bandwidth using a 12 volt battery and an integrated antenna. This lab report even includes a picture of the waveform we'll be reproducing soon.

Step 2: Sniffing the Signal

So now we know where to look for the signal, at 314.9020 MHz and that it's using ASK or Amplitude Shift Key modulation. Using one of my favorite tools, the RTL-SDR, we can now sniff that signal up for analysis. To do so we used GQRX on Kali Linux 2.0.

It's just a matter of tuning the RTL-SDR dongle to the 315 MHz frequency and recording the signal.

315 MHz isn't technically an unlicensed ISM band like WiFi, but the FCC has a license free part 15 band for "Short Range Devices" which commonly use 315 MHz. In Europe you'll more commonly find 433 MHz.

Step 3: Identifying and Decoding the Signal

Since we're dealing with radio signals -- actual waveforms rather than digital wireless packets or frames like with WiFi -- we don't have the luxury of using an analyzer like Wireshark. Rather in this case I'm just going to open up the file in the audio editor Audacity.

And here if we zoom in we'll see the actual signal. What's happening here is when the remote button is pressed we get these pulses. This is what's known as On-Off-Keying, and it's the simplest form of amplitude-shift keying modulation. In this case a pulse is a binary 1 and the absence of a pulse is a binary zero. It's sort of like CW or Morse Code.

More on OOK: https://www.maximintegrated.com/en/ap...

Step 4: Decoding the Signal

Looking at the wave form we can determine a 1 by a pulse and a 0 by the lack there of. Measuring out the distance of a single pulse helps identify two more more consecutive pulses.

Looking at our wave form we get 10001110 11101000 11101000 10001000 10001000 11101000 10001000 10001000. If we convert this to hex in the command line, say with this bash one-liner: printf '%x\n' "$((2#10001110))"

Alternatively just search for a binary to hex converter and what we end up with is 8E E8 E8 88 88 E8 88 88.

The last bit we need to know is the data rate - or how fast each chirp in the On-Off-Keying is transmitted.

To do that we'll just need to select one of the one or zero bits in our audio editor Audacity and determine how long in seconds each bit lasts. In our case it's going at a speed of 0.00055 seconds, or 550 microseconds, which is about 1800 bits per second.

Step 4: Sending the Replay Attack

Finally we fire up RfCat to perform the replay attack. First we'll need to set the frequency with d.setFreq(315060000).

Next we'll need to set the modulation to On-Off-Keying with Amplitude Shift Keying with d.setMdmModulation(MOD_ASK_OOK)

Then it's the data rate which we figured out to be about 550 microseconds so that'll be d.setMdmDRate(int(1.0/0.000550))

Finally we can inject the hex values we converted with d.RFxmit("\x8E\xE8\xE8\x88\x88\xE8\x88\x88\x00\x00\x00" * 40)

d.RFxmit will transmit the hex values using the parameters we just set and I've gone ahead and added three null bytes at the end because we want to transmit the signal over and over a few times to make sure the receiver picks it up -- in this case I'm using * 40 to transmit the binary data 40 times.

If all goes well, you should be mimicking the action of the remote signal captured in step 2.

Read more in our show notes at http://hak5.org

~-~~-~~~-~~-~
Please watch: "Bash Bunny Primer - Hak5 2225"
   • Bash Bunny Primer - Hak5  2225  
~-~~-~~~-~~-~
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

How to Hack Wireless Remotes with Radio Replay Attacks - Hak5 1909

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Radio Hacking: Reverse Engineering Protocols Part 2 - Hak5 1914

Radio Hacking: Reverse Engineering Protocols Part 2 - Hak5 1914

Hacking My Ceiling Fan Radio Signal With a $15 USB TV Tuner (RTL2832U)

Hacking My Ceiling Fan Radio Signal With a $15 USB TV Tuner (RTL2832U)

Это спасет, когда заблокируют ВЕСЬ ИНТЕРНЕТ!

Это спасет, когда заблокируют ВЕСЬ ИНТЕРНЕТ!

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

Radio Hacking: Reverse Engineering Protocols Part 1 - Hak5 1913

Radio Hacking: Reverse Engineering Protocols Part 1 - Hak5 1913

ЧТО СКРЫВАЮТ РАДИОВОЛНЫ?

ЧТО СКРЫВАЮТ РАДИОВОЛНЫ?

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Bluetooth-шпионаж: Как ваши гаджеты следят за вами? OSINT-расследование

Bluetooth-шпионаж: Как ваши гаджеты следят за вами? OSINT-расследование

Advanced Netcat and TCP Fun - Hak5 1922

Advanced Netcat and TCP Fun - Hak5 1922

I Hacked Into My Own Car

I Hacked Into My Own Car

Digital Ding Dong Ditch Prank - hacking wireless doorbells w/Arduino and RTL-SDR

Digital Ding Dong Ditch Prank - hacking wireless doorbells w/Arduino and RTL-SDR

How to begin hacking with the YARD Stick One - Hak5 1908

How to begin hacking with the YARD Stick One - Hak5 1908

Как строили корабли для мирового господства

Как строили корабли для мирового господства

Replay Attack with GNU Radio and Hack RF (Tutorial)

Replay Attack with GNU Radio and Hack RF (Tutorial)

КАК ПОЙМАТЬ ПЕРЕГОВОРЫ ПО РАЦИИ. САМЫЙ ПРОСТОЙ И РАБОЧИЙ СПОСОБ.

КАК ПОЙМАТЬ ПЕРЕГОВОРЫ ПО РАЦИИ. САМЫЙ ПРОСТОЙ И РАБОЧИЙ СПОСОБ.

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

Роковая ошибка Jaguar: Как “повестка” в рекламе добила легенду британского автопрома

Роковая ошибка Jaguar: Как “повестка” в рекламе добила легенду британского автопрома

2 Second Password Hash Hack - Hak5 2102

2 Second Password Hash Hack - Hak5 2102

#44 Hacking and Cloning a Garage Door Opener using SDR Radio

#44 Hacking and Cloning a Garage Door Opener using SDR Radio

18 SDR Tricks with the hackrf

18 SDR Tricks with the hackrf

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]