Go check out ’s piece on the last seven years of RTL-SDR to get caught up to speed. ![]() It’s a great build that demonstrates the wide appeal of software-defined radio, and if you want to get started it’s pretty easy to grab a much cheaper dongle and use it for all kinds of applications like this. It seems as though the data feed included a number of different elements including time, location information, and other real-time data about the rocket’s flight. From there, they were recorded with GNU Radio, converted into binary data, and then translated into text. Using this SDR peripheral as well as a 1.2 m repurposed satellite dish, the duo were able to intercept the radio transmissions from the in-flight rocket. ![]() While the HackRF is a much more expensive piece of equipment compared to the RTL-SDR dongles used to listen in on aircraft, it is much more capable as well, with a range from 1 MHz to 6 GHz. Reddit users and used a HackRF module to listen in to the Falcon 9’s data transmissions during its latest launch. It turns out another type of vehicle, SpaceX’s Falcon 9 spacecraft, reports data via radio as well and with some slightly upgraded hardware it’s possible to “listen in” to these flights in a similar way. One common build with these cards is monitoring air traffic, which send data about their flights out in packets over the radio and can easily be received and decoded now. The amateur radio community has exploded with activity lately especially in the software-defined radio (SDR) area since it was found that a small inexpensive TV tuner could be wrangled to do what only expensive equipment was able to do before. Posted in Security Hacks Tagged air gap, Cat6, ethernet, exfiltration, exploit, HackRF, RF, RTL-SDR But it’s a pretty effective demonstration, but along with the previously demonstrated hard drive activity lights, power supply fans, and even networked security cameras, it adds another seemingly innocuous element to the list of potential vectors for side-channel attacks. To be sure, this exploit is quite contrived, and fairly optimized for demonstration purposes. The bit rate is low - only a few bits per second - but that may be all a malicious actor needs to achieve their goal. Either way, an RF signal is radiated by the Ethernet cable, which was easily received and decoded over a distance of at least two meters. The attack, dubbed “LANtenna”, does require some software running on the target machine, which modulates the desired data and transmits it over the Ethernet cable using one of two methods: by toggling the speed of the network connection, or by sending raw UDP packets. The exploit requires almost nothing in the way of fancy hardware - he used both an RTL-SDR dongle and a HackRF to receive the exfiltrated data, and didn’t exactly splurge on the receiving antenna, which was just a random chunk of wire. This time, your suspicious gaze will settle on the lowly Ethernet cable, which he has used to exfiltrate data across an air gap. Your HackRF One order will include an injection molded plastic enclosure and a micro USB cable.Good news, everyone! Security researcher has given us yet another reason to look askance at our computers and wonder who might be sniffing in our private doings.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |