PandwaRF
Description
PandwaRF is a family of pocket-sized, portable RF analysis tools operating the sub-1 GHz range produced by the Comthings, a French startup focused on the PandwaRF analysis tool and custom RF penetration testing tools for professionals and law en�forcement agencies. [Tan] Together with PandwaRF Rogue Pro, it allows the capture, analysis and re-transmission of RF via an Android device or a Linux PC. It can be connected to an Android smartphone using BLE or USB, and to Linux us�ing USB. It is based on the well-known RfCat and Yard Stick One tools with the Texas Instruments CC1111 RF transceiver [Ins13], but with a lot of new features, making PandwaRF the perfect portable RF analysis tool.[Tan17] Practically, it removes the ‘standard SDR Grind’ of capturing, demodulating, analyzing, modifying and replaying by hand – replacing it with a simple but powerful interface. The PandwaRF system consists of two elements: the hardware device and the soft�ware controller, either an Android device or a PC. The hardware is a very capable device, tailored for beginners and advanced users alike. Beyond the functionality provided by the Android interface, the PandwaRF can be easily controlled and customized. No need to risk bricking your device or writing in C, the PandwaRF can be controlled by JavaScript, directly on the smartphone. The Rogue Pro was designed for advanced users like pentesters or security pro�fessionals and it is specialized on brute forcing wireless devices in order to test their security.
General Overview
PandwaRF is a Radio Frequency hacking tool used to:[1]
Receive
Transmit
Analyze
Technical Overview
PandwaRF is composed of 2 elements:
PandwaRF HW dongle
The PandwaRF dongle contains[2]:
Possible applications
Hardware Antennas
In its antenna pack version, PandwaRF is shipped with 3 miniature SMA antennas (315/433/868-915 MHz).
Using the proper antenna is critical to have good RF performance. Antennas are labelled with the first digit of their frequency band:
Warning
PandwaRF is a test equipment for RF systems. It has not been tested for compliance with the regulations governing the transmission of radio signals. You are responsible for using your PandwaRF legally. The intentional jamming of RF signals is ILLEGAL. PandwaRF should only be used for testing the robustness of your own devices.
References
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)