Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won


1 Follower

About NotPike

  • Rank
    Hak5 Fan ++
  • Birthday 01/01/1970

Profile Information

  • Gender
  • Interests

Recent Profile Visitors

2,437 profile views
  1. The YSO transmitting my FCC ID in the background just to keep this little operation legal. Also making it encrypted will be violating my ham license.
  2. Cool! I just wrapped mine in shrink wrap.
  3. HackRF Software Defined Radio TX/RX 1MHz to 6GHz Half-duplex transceiver (One antenna port to TX/RX, can't do both at the same time) Bandwidth: 20MHz Oscillator sensitivity (Timing): ~30PPM YARD_Stick_One Software Controlled Radio: Modulation, filters, bandwidth all handled by the hardware but still controlled via software. Uses a TI CC1111 for the radio controller TX/RX 300-348 MHz, 391-464 MHz, and 782-928 MHz Supported Modulations: ASK, OOK, GFSK, 2-FSK, 4-FSK, MSK Supports Frequency Hopping Uses RFcat as a controller via a Python environment Ubertooth_One Software Controlled Radio: Modulation, filters, bandwidth all handled by the hardware but still controlled via software. Uses a TI CC2400 2.4GHz Transceiver Supports Wi-Fi, Bluetooth, Zigbee Software_Defined_Radio_Mobile_Kit() HackRF + YARD_Stick_One + Ubertooth_One == Software_Defined_Radio_Mobile_Kit Hoped this helps! :D
  4. No clue! Threw me for a loop when I first got the remote.
  5. I just started using this OS last week and holy cow dose it have power! It's claim to fame is that it compartmentalizes sessions by running mutable VM's. For example, there's a VM (sys-net) that controls you networking hardware, another VM that acts as a firewall (sys-firewall) which routes all traffic to your working VM. It's based off of Fedora-23 and uses the Xen Hypervisor to manage it's VM's. There's also built in TOR support with Whonix. You can also do more complex tasks like analyze untrusted services using a throw away VM and not worry about effecting the rest of your system.
  6. sdr

    I'm not to familiar with using Audacity but have you ever tried inspectrum? It has more features then Audacity like outputting signal values and a tool to determine the symbol rate.
  7. Try running it as root or use sudo. Name@Computer:~$ sudo python Also that's an interesting way to repeat the command 10 times. It's not wrong don't get me wrong but it's a way to keep the 10101010... preamble from being transmitted 10 times instead of using the repeat feature of the RFxmit() function.
  8. Hi, which SDR and what operating system are you trying to use? Basicly your computer is saying, "Hey I don't know how to control this device..." You'll you need to download/install the software to control the device (drivers) and 99.9% of the time you should be able to use that USB port for other media.
  9. No worries! Yah I would take the time and learn Python and use the code above as an example. Best of luck!
  10. Anyone else try coding their own IRC bots? Here's my dirty little Python script for 'PikeBot'
  11. Would be cool to see more people share what they where working on. :/
  12. -=UPDATE=- V0.4 has been released. TX all commands as you would with the remote Passive PIN discovery Brute Force a command, loops threw all 256 PINs for a single command. Dank ass meme's! Booze, Chicks/Dudes and more!
  13. Hey, Do you know how to script in Python2.7? If not no worries, it's easy :D Yes! You can write a dedicated script that pulls from the RfCat liberies (The software used to control CC1111 chips) and have them run independently from the RfCat interactive environment. So here's what you'll need to do. 1.) You either need to have your script run the same directory where 'rfcat' is located or... 2.) Make a copy of the folders 'rflib' and 'vstruct' and and all their contents and put them in the same working directory of your script. 3.) Import the rflib libraries into your python script with 'from rflib import *' 4.) assign the function 'RfCat()' to 'd' 5.) set variables and make calls to each function as you would in RfCat Here's a quick and dirty example on how to use RfCat in a python script. I didn't call any of the functions in the example below but you can use this as an example on how to format your script. You can always read up on any RfCat function by typing in 'help(d)' while your in the rfcat interactive environment. #!/usr/bin/python #Lets make a python script for RfCat! #Example below deminstrates TX with ASK/OOK #Imports all the liberys from rflib into your script from rflib import * import datetime #assign the function RfCat() to 'd' d = RfCat() #Just like in the interactive environment, you can set veriables by typing in 'd.FUNCTION(VALUE)' def SetRadio(): d.setFreq(433.92e6) d.setMdmModulation(MOD_ASK_OOK) d.setMdmDRate(1766) d.setPktPQT(0) d.setMdmSyncMode(2) d.setMdmSyncWord(0xff) d.setMdmNumPreamble(0) d.makePktFLEN(16) #How to RX def RX(): while True: #or 'while not keystop()' if you want to kill the loop by hitting the enter key packet, timestamp = d.RFrecv() if VerifyPacket(packet): #sanity check, makes sure the packet is valid time = datetime.datetime.fromtimestamp(ts).strftime('%H:%M:%S') data = str(pkt.encode('hex')) print "<*> %s: RX: %s" % (time,data) #Example sanity check, if your packet dosen't start with 0x00a2888a after what you have the preamble set to #this function will return False and 'if VerifyPacket(packet):' will not execute the commands below. #It will loop back to 'while True:' and try again. def VerifyPkt(pkt): if ord(pkt[0]) != 0x00: return False if ord(pkt[1]) != 0xa2: return False if ord(pkt[2]) != 0x88: return False if ord(pkt[3]) != 0x8a: return False return True #Any data being TXed can be ASCII, decoded HEX, at least as far as I know :D #d.RFxmit(data, repeat=0, offset=0) #repeat of 65535 means 'forever' #How to TX ASCII def TxASCII(): d.RFxmit('HELLOWORLD') #How to TX decoded HEX def TxHEX(): #Hex hardcoded in, 0xff00ff is 111111110000000011111111 in binary and your ASK/OOK will look like that too! #1 is on, 0 is off d.RFxmit('\xff\x00\xff') #Hex in a veriable HexMessage = '1234ffff0000' #starts as a string d.RFxmit(HexMessage.decode('hex')) #decoded so RfCat is happy :D If you want to learn more about RfCat I would recommend watching this. Also I just finished a project using RfCat to reverse a Juke Box remote and made a small script that dose sends remote commands, passive PIN discovery, and brute forcing! Here's a video series I recommend if you are brand new to Python. The video series teaches Python3 and even thou RfCat works with Python2.7, both versions of python are not that different. If you google the differences between Python2.7 and Python3 you'll see what I mean. Let me know if you have any questions and happy hacking! :D