Difference between revisions of "PandwaRF"
m (ORusu moved page (Article title) to PandwaRF) |
|||
Line 1: | Line 1: | ||
== | == Description == | ||
PandwaRF | |||
== | PandwaRF is a family of pocket-sized, portable RF analysis tools operating the sub-1 | ||
GHz range produced by the Comthings, a French startup focused on the PandwaRF | |||
analysis tool and custom RF penetration testing tools for professionals and law en�forcement agencies. [Tan] Together with PandwaRF Rogue Pro, it allows the capture, | |||
analysis and re-transmission of RF via an Android device or a Linux PC. | |||
It can be connected to an Android smartphone using BLE or USB, and to Linux us�ing USB. It is based on the well-known RfCat and Yard Stick One tools with the Texas | |||
Instruments CC1111 RF transceiver [Ins13], but with a lot of new features, making | |||
PandwaRF the perfect portable RF analysis tool.[Tan17] Practically, it removes the | |||
‘standard SDR Grind’ of capturing, demodulating, analyzing, modifying and replaying | |||
by hand – replacing it with a simple but powerful interface. | |||
The PandwaRF system consists of two elements: the hardware device and the soft�ware controller, either an Android device or a PC. The hardware is a very capable | |||
device, tailored for beginners and advanced users alike. | |||
Beyond the functionality provided by the Android interface, the PandwaRF can be | |||
easily controlled and customized. No need to risk bricking your device or writing in C, | |||
the PandwaRF can be controlled by JavaScript, directly on the smartphone. | |||
The Rogue Pro was designed for advanced users like pentesters or security pro�fessionals and it is specialized on brute forcing wireless devices in order to test their | |||
security. | |||
==General Overview== | |||
PandwaRF is a Radio Frequency hacking tool used to:<ref>https://www.comthings.com/</ref> | |||
===Receive=== | |||
<li>Capture any data in ASK/OOK/MSK/2-FSK/GFSK modulation from the frequency range: 300-348 MHz, 391-464 MHz and 782-928 MHz</li> | |||
<li>Transfer the captured data to your smartphone & save/share it | |||
<li>Send the captured data in JSON to your own server for post-processing | |||
<li>Write your own scripts or use a provided one | |||
===Transmit=== | |||
<li>Transmit previously captured data or write your own | |||
<li>Transmit data from a smartphone or directly from PandwaRF | |||
<li>Brute force with a predefined transmission pattern (encoders or devices) | |||
<li>Transmit power: +10dBm | |||
===Analyze=== | |||
<li>Visualize the frequency used by any device using the PandwaRF built-in Spectrum Analyzer | |||
<li>Directly show the maximum and average RSSI for a specific frequency band | |||
==Technical Overview== | |||
PandwaRF is composed of 2 elements: | |||
<li>PandwaRF HW dongle | |||
<li>PandwaRF Android application | |||
===PandwaRF HW dongle=== | |||
The PandwaRF dongle contains<ref> https://pandwarf.com/pandwarf-rogue-pro/ </ref>: | |||
<li>Bluetooth Smart Module ISP130301, based on nRF51 | |||
<li>CC1111 Low-Power SoC with Sub-1 GHz RF Transceiver | |||
<li>16 Mbit Flash Memory to save custom RF protocols | |||
<li>Rechargeable battery powered for stand-alone operation | |||
<li>Battery fuel gauge | |||
<li>SMA connector | |||
<li>4 buttons | |||
<li>4 Status LEDs | |||
<li>Debug connectors & GPIOs | |||
==Possible applications== | |||
<li>Receive keyfobs transmission (car, alarm, gate opener, …) | |||
<li>Replay captured transmission from keyfobs | |||
<li>Replay a modified captured transmission | |||
<li>Transmit your own custom payload | |||
<li>Capture RF data and transmit it on another frequency | |||
<li>Brute force wireless devices (alarms, gate openers etc)<ref>https://github.com/ComThings/PandwaRF/wiki</ref> | |||
<li>Spectrum Analyzer | |||
<li>Find the frequency used by a RF device | |||
<li>Reverse engineer unknown protocols | |||
<li>Measure the data rate of a transmission | |||
<li>Check the RF jam-resistance of your own devices | |||
<li>Send captured data to a server for post-processing | |||
<li>Write custom Javascript scenarios | |||
<li>Develop your own Android application | |||
==Hardware Antennas== | |||
In its antenna pack version, PandwaRF is shipped with 3 miniature SMA antennas (315/433/868-915 MHz). | |||
Using the proper antenna is critical to have good RF performance. | |||
Antennas are labelled with the first digit of their frequency band: | |||
<li>3 for 315 MHz, | |||
<li>4 for 433 MHz, | |||
<li>8/9 for 868/915 MHz | |||
===Warning=== | |||
PandwaRF is a test equipment for RF systems. It has not been tested for compliance with the regulations governing the transmission of radio signals. You are responsible for using your PandwaRF legally. The intentional jamming of RF signals is ILLEGAL. PandwaRF should only be used for testing the robustness of your own devices. | |||
== References == | |||
<references /> | |||
=== Step 1 === | === Step 1 === |
Revision as of 15:46, 3 February 2022
Description
PandwaRF is a family of pocket-sized, portable RF analysis tools operating the sub-1 GHz range produced by the Comthings, a French startup focused on the PandwaRF analysis tool and custom RF penetration testing tools for professionals and law en�forcement agencies. [Tan] Together with PandwaRF Rogue Pro, it allows the capture, analysis and re-transmission of RF via an Android device or a Linux PC. It can be connected to an Android smartphone using BLE or USB, and to Linux us�ing USB. It is based on the well-known RfCat and Yard Stick One tools with the Texas Instruments CC1111 RF transceiver [Ins13], but with a lot of new features, making PandwaRF the perfect portable RF analysis tool.[Tan17] Practically, it removes the ‘standard SDR Grind’ of capturing, demodulating, analyzing, modifying and replaying by hand – replacing it with a simple but powerful interface. The PandwaRF system consists of two elements: the hardware device and the soft�ware controller, either an Android device or a PC. The hardware is a very capable device, tailored for beginners and advanced users alike. Beyond the functionality provided by the Android interface, the PandwaRF can be easily controlled and customized. No need to risk bricking your device or writing in C, the PandwaRF can be controlled by JavaScript, directly on the smartphone. The Rogue Pro was designed for advanced users like pentesters or security pro�fessionals and it is specialized on brute forcing wireless devices in order to test their security.
General Overview
PandwaRF is a Radio Frequency hacking tool used to:[1]
Receive
Transmit
Analyze
Technical Overview
PandwaRF is composed of 2 elements:
PandwaRF HW dongle
The PandwaRF dongle contains[2]:
Possible applications
Hardware Antennas
In its antenna pack version, PandwaRF is shipped with 3 miniature SMA antennas (315/433/868-915 MHz).
Using the proper antenna is critical to have good RF performance. Antennas are labelled with the first digit of their frequency band:
Warning
PandwaRF is a test equipment for RF systems. It has not been tested for compliance with the regulations governing the transmission of radio signals. You are responsible for using your PandwaRF legally. The intentional jamming of RF signals is ILLEGAL. PandwaRF should only be used for testing the robustness of your own devices.
References
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)