Skip to content
Ficti0n edited this page Jul 22, 2021 · 34 revisions

Welcome to the RFCrack wiki!

Initial Release Walkthrough Tutorial:

https://www.youtube.com/watch?v=H7-g15YZBiI

Reversing Signals With RFCrack Tutorial:

https://www.youtube.com/watch?v=XqKoVFyOst0

3 part RF Hacking series:

Part 1: https://console-cowboys.blogspot.com/2017/10/hacking-everything-with-rf-and-software.html

Part 2: https://console-cowboys.blogspot.com/2017/10/hacking-everything-with-rf-and-software_24.html

Part 3: https://console-cowboys.blogspot.com/2018/01/hacking-everything-with-rf-and-software.html

Hardware Needed:

YardStick: https://goo.gl/wd88sr

Version 1.1 Changes:

Device Templates:

I added saving and loading device templates: -d will ask you for a template name at the end of your attack and allow you to save your working configuration

-l added to your cmdline with the filename will load in the previous settings

There is an example file in the directory called doorbell.config which you can modify directly if you wish

I also added in the ability to change more settings:

-V deviation for your modulation

-S change the channel spacing

Version 1.2 Changes:

Scanning Logs:

Scanning logs were added when scanning known frequencies or bruteforcing for red teaming initiatives and drop boxes that need a log for later use. This will happen automatically and create log files in the scanning_logs folder.

The files folder was renamed to captures, with all the new functionality and folders added to support that functionality, folders needed to be more clearly defined.

There were also numerous other small changes and code reworking since the last release.

Version 1.3 Changes:

Signal Identification and Graphing for Comparison

  • Live Signal comparison and graphing - Complete

This compares the likelihood of signal match percentage with each part of the live capture as well as graphs the comparison between your capture and the current live capture.

Use 2 Console Windows:(Image display only tested on OSX, may pull up on linux)

Setup sniffer:      python RFCrack.py -k -c -f <frequency>

Setup Analysis:     python RFCrack.py -c -u <payload> -n
  • Log analysis of signals and comparisons - Code is there, just finishing it up

One use for signal identification is automating reversing of blackbox clicker devices

There is also experimental code added for other analysis and attacks, to be fully implemented in future release

Version 1.4 Changes:

Cleaned a few things up, added single signal graphing as well:

Graphing captured signal:

New Tutorial on some updated features:

Reversing Signals With RFCrack: https://www.youtube.com/watch?v=XqKoVFyOst0

python RFCrack.py -n -g -u <payload>

Fixed graphing in linux using Kali for testing. RFCrack is an OSX application, though I try to fix things in linux when I add new features I know may break in linux.

Version 1.5 Changes:

VERSION Update: this has been updated to Python3 and should work but there are all
                kinds of issues I am running into with Yardstick firmware versions, 
                sdcc versions, rfcat etc which may also effect you.. See the RFCat documentation 
                if you run into issues.