Wireless hacking 20120126

9
OSHUG #15 Hacking Commodity Wireless Paul Tanner @paul_tanner slideshare.net/paul_tanner

description

Talk about how to connect proprietary devices to your network understanding protocols with low-cost tools.

Transcript of Wireless hacking 20120126

Page 1: Wireless hacking 20120126

OSHUG #15 Hacking Commodity Wireless

Paul Tanner@paul_tanner

slideshare.net/paul_tanner

Page 2: Wireless hacking 20120126

Background

● Why make what you can buy?

● Proprietary tech but with benefits

● Very limited doc● Not easy without

sophisticated tools● Let's mess around

Page 3: Wireless hacking 20120126

Approach

● Observe the protocol● Increase the doc● Deduce the protocol● Code and test

● Transmitter (easy)● Receiver (hard)

● Iterate (potentially for ever :)

Page 4: Wireless hacking 20120126

Nah! El-cheapo version

● Some of these devices use 433Mhz signalling

● In which case use audio recording

● PC or Mac + softwaree.g. Audacity

● Otherwise start saving up

Page 5: Wireless hacking 20120126

RF-to-audio etc

● Ard. shield makes for convenient mounting

● Receiver has digital output and no embedded protocol

● Transmitter likewise● Alternatives available● Could add switches to

power down when not in use.

Page 6: Wireless hacking 20120126

Some Results

Somewhat inconsistent snapshots but you get the idea

Page 7: Wireless hacking 20120126

Get Measurements

● Simple program can capture pulse widths

● Inevitably there's noise – shield?

● Triggering needed for infrequent transmissions

● Then add decoder

Page 8: Wireless hacking 20120126

Magic happens here

● Look for clues e.gBlogs etc

● Expect e.g. Manchester encoding

● Expect redundancy, e.g. checksums

● Hope for inspiration● Test and iterate

Page 9: Wireless hacking 20120126

Conclusion

● It can be done● Most successful with

output devices● Very hard with

devices that send infrequently

● Online help limited but does exist