Close

Hack Chat Transcript, Part 1

A event log for RF Hacking Hack Chat

Find out what's behind the waterfall

dan-maloneyDan Maloney 10/12/2022 at 20:220 Comments

Dan Maloney12:00 PM
OK folks, let's get it going! Welcome to the Hack Chat, I'm Dan, and Dusan and I will be moderating today as we welcome Chris Poore for a chat about RF Hacking!

Hi Chris, thanks so much for your time today. Can you tell us a little about your interest in RF and reverse engineering?

Dusan Petrovic12:00 PM
Hi everyone!

salec12:00 PM
@anarchoN3rd : today the speaker is @Chris Poore

Chris Poore12:00 PM
Sure, I work at a cybersecurity company called Assured Information Security (AIS). So it mostly originates from what we do.

Dan Maloney12:00 PM
@anarchoN3rd -- Chris Poore is the invited guest, but it's really just a chat among friends. This week it's about RF Hacking

Chris Poore12:01 PM
We provide government and commercial customers with industry leading cyber and information security capabilities specializing in research, development, consulting, testing, forensics, remediation and training.

Chris Poore12:01 PM
I specifically work on a team that identifies weaknesses, verifies systems, and provides solutions to customers.

mike joined  the room.12:01 PM

Chris Poore12:01 PM
We’re often provided with systems or tasked to look at targets and we have to characterize their operation and assess their security.

Mark J Hughes12:02 PM
What tools do you use?

Mark J Hughes12:02 PM
What are common vulerabilities you find?

anarchoN3rd12:02 PM
@Dan Maloney is there a video I am supposed to be seeing or just a chat?

Monta joined  the room.12:02 PM

Paulmsam12:02 PM
I'm quite curious on where do you start. Besides the usual FCC info :)

Chris Poore12:02 PM
Well, it's a pretty diverse team and I specialize in topics related to RF technology

Dan Maloney12:02 PM
@anarchoN3rd - just text. We roll old school here ;-)

Chris Poore12:03 PM
So pretty much anything with a computer that has a wireless aspect, I've looked at

kkbennett3 joined  the room.12:03 PM

neiyer.correal joined  the room.12:03 PM

Chris Poore12:04 PM
That covers a lot of tools as you can imagine

salec12:04 PM
Does your job also include probing inadvertent emissions security, like project Tempest?

Chris Poore12:04 PM
We've had people work on projects like that and are familiar with the technology

anarchoN3rd12:04 PM
@Dan Maloney that's pretty cool, actually. Just misunderstood the assignment ;)

Brendancontest12:05 PM
I have question about RF. I moved into a place that has an alarm system. I didn’t want it. But would like to play with the sensor they left. Door/movement/water. Is there a way to use these devices.

Thomas Shaddack12:05 PM
Does it have to be only about computers emitting data, or can we include other EMI as well, from said tempest to eg. machinery health detection by detection sparking? Detection of cameras and other devices by their EM signatures?

don.wills12:06 PM
I too am curious about devices such as those that are part of SimpliSafe.

Chris Poore12:07 PM
With certain devices you can repurpose them, but it will usually take a good understanding of the underlying technology

salec12:07 PM
@Thomas Shaddack If a tree falls in a wood and there IS someone to hear it ...

Zach Kost-Smith12:08 PM
Do you use GNURadio in your work?

Chris Poore12:08 PM
There are all these different applications of RF and security so I'm here mostly to promote a project I've been working on that kind of brings it all together in one place

DuckPaddle12:08 PM
Do you ever work with 24GHz stuff and do you have any low cost hacks for signal reception?

Brendancontest12:09 PM
@chris where would be a good place to find information. I’m pretty sure they are using 915 freq. but with having limited tool to analyze the RF what other option does someone have to play around with the devices?

Chris Poore12:09 PM
I'm quite involved with GNU Radio, just got back from GRCon. The project I'm promoting is an RF framework called FISSURE: https://github.com/ainfosec/FISSURE

Paulmsam12:09 PM
Fissure? I have installed it, Need a bit of a tutorial on it to be honest. Unsure of the correct order or working

joereith12:10 PM
@Chris Poore What made you decide to build FISSURE? It seems like a pretty refined framework for modular plugins.

Andre Lewis joined  the room.12:10 PM

Chris Poore12:11 PM
I haven't been too involved with the 24 GHz stuff, mostly due to hardware restrictions.

DuckPaddle12:11 PM
@Brendancontest Pop the gizmo open, look for the chip set, order the dev kit from the manuf.

Brendancontest12:11 PM
Thank you @chris. I’ll read through that and start there to see how the team worked with with the RF.

salec12:11 PM
Is Ubuntu obligatory? How much trouble should I expect on Arch/Artix?

Carlos Orts joined  the room.12:11 PM

Christopher12:12 PM
@salec should work OK on arch

Brendancontest12:12 PM
@duckpaddle I’ll try that never though of ordering a dev kit.

Chris Poore12:12 PM
Let me just dump some information on FISSURE to get people in the loop

Chris Poore12:12 PM
FISSURE is an open-source RF and reverse engineering framework that contains hooks for detection, classification, protocol discovery, attack execution, vulnerability analysis, automation, and AI/ML.

Chris Poore12:13 PM
Its original purpose was to speed up the characterization of signals and the identification of vulnerabilities in RF protocols, waveforms, and devices.

Andre Lewis12:13 PM
Is this mostly an integration of other tools or new work that overlaps?

Chris Poore12:13 PM
But it has evolved to consolidate all-things RF: software modules, radios, protocols, signal data, scripts, flow graphs, reference material, and third-party tools

Dan Maloney12:13 PM

https://hackaday.com/2022/08/27/introducing-fissure-a-toolbox-for-the-rf-hacker/

HACKADAY DAN MALONEY

Introducing FISSURE: A Toolbox For The RF Hacker

No matter what the job at hand is, if you're going to tackle it, you're going to need the right kit of tools. And if your job includes making sense out of any of the signals in the virtual soup of RF energy we all live in, then you're going to need something like the FISSURE RF framework.

Read this on Hackaday

vinnie moscaritolo joined  the room.12:13 PM

Chris Poore12:14 PM
It's a place to test out new things but also quickly access things you have relied upon in the past

anfractuosity12:14 PM
How are you performing signal classification out of interest, i assume that means determining if a signal is say FSK,PSK,...? Is that via ML or..?

salec12:14 PM
Is this legal for us (foreign) civilians? Looks like something which could be under export restrictions.

DuckPaddle12:14 PM
Would Fissure work with RFID protocols?

Mark J Hughes12:14 PM
What hardware do you need to run FISSURE?

Chris Poore12:15 PM
A lot of what is included in the software for FISSURE now, is mostly examples of how to certain things. It's still pretty early going in the project but I wanted to make it available so people can take a look at and see what it is about

Chris Poore12:16 PM
So research areas like signal classification are not fully fleshed out as a finished product, but as I (and others) work on it, there is a place to put our code

Chris Poore12:16 PM
that's the framework aspect of it

FedX12:17 PM
So is this a framework in the sense of Metasploit where it provides pre-packaged tools, or a framework like Nix where it provides the tools to build the tools?

Chris Poore12:18 PM
many of these technical areas have been performed ten times over by people across the world but this software provides a place to swap out techniques and use what works best for people

salec12:18 PM
A top down design, and "down" may vary

Chris Poore12:18 PM
The framework is meant to flexible and inclusive to most people, so it uses (or could use) most commercial SDRs

kjansky112:19 PM
Technically electromagnetic but not classified as RF have you looked into hacking of potential LASER comms from orbit by satellites or is the directionality the limiting factor here?

Chris Poore12:19 PM
or other types of hardware besides SDRs, like 802.11 adapters or zigbee sniffers

DuckPaddle12:20 PM
Cool got a preferred zigbee sniffer?

morgan12:20 PM
I see some esp32 modules in there, that used for BLE sniffing?

Thomas Shaddack12:20 PM
@kjansky1 I'd guess once you get it sampled into the machine it's the same. Quite some similarity these days between encoding for rf and for wire/fiber and I can imagine it will be the same for free-space laser.

morgan12:20 PM
bt/ble

Chris Poore12:20 PM
There's a lesson on RFID included with FISSURE if you want to read up on it. It can be used for RFID, there only a few RFID tools included right now though

Thomas Shaddack12:21 PM
Is it I/Q only or can it take even a raw sampled waveform eg. from an oscilloscope?

salec12:21 PM
Are some protocols already included? I am personally interested in DECT.

Chris Poore12:21 PM
FISSURE has a couple pieces, it's mostly a GUI with menu items and tabs. The menu items are filled with third-party tools, standalone flow graphs, help items, reference material.

Chris Poore12:22 PM
So there are third-party tools for Wi-Fi, bluetooth, and other protocls

Chris Poore12:22 PM
But the tabs below are more tailored towards making sense of signals and characterizing them

Chris Poore12:23 PM
recording signals, building up a library of information, running attack scripts/flow graphs

Chris Poore12:23 PM
There's limited DECT included. We initially tested the project with a baby monitor and I know it also installs gr-dect2

kjansky112:24 PM
How about counter-measures like for GPS spoofing.

Chris Poore12:25 PM
FISSURE is pretty modular, most of the signal data is meant to be handled as I/Q data but you could build it out to accept it in other forms

Chris Poore12:25 PM
If you can think of a way to pass data to a Python component, it can probably be achieved and you can do whatever you want with it from there

Chris Poore12:26 PM
The framework is meant to be transparent so you can edit it on your own

f4hga joined  the room.12:26 PM

FedX12:26 PM
I am looking into porting Fissure to Nixpkgs. Any tips?

Zach Kost-Smith12:26 PM
Are there lessons on writing modules?

Chris Poore12:26 PM
There a variety of GPS tools. I've been using a USB GPS receiver to test them

FedX12:26 PM
I know that's more of a Nix problem, I more meant, is there any stand-out uniquness in the vodebas.

Chris Poore12:27 PM
There isn't much there for actively generating GPS signals or spoofing, but FISSURE acts as a place to put such tools as they are developed

Chris Poore12:29 PM
There are a couple help menu items for adding GUI elements to the dashboard but further documentation on creating standalone components will be released in the future

Chris Poore12:29 PM
and there are other topics like adding attacks, uploading flow graphs/scripts

kjansky112:30 PM
How about applications for use with coherent multi SDR receivers such as the Kraken..

Chris Poore12:31 PM
I'm a little hesitant in packaging up FISSURE mostly due to all the third-party tools. More needs to be done to isolate the main features in the tabs from all the extraneous software meant for quick access

Chris Poore12:32 PM
Right now, FISSURE is designed for kind of a single-computer laboratory setup.

Chris Poore12:33 PM
The components communicate to each other over a network and at one time it was distributed across multiple computers in different locations

Andre Lewis12:34 PM
Should work in a vm? So long as the sdr can get a passthrough?

Chris Poore12:34 PM
but as far as the radios and RF hardware, it's really just a single assignment to one particular function

Chris Poore12:35 PM
in the long-term it will probably change to more a multiple sensor deployment scheme so you could have multiple radios doing multiple things, sending data back over a network

Chris Poore12:36 PM
so for multi-SDR receivers it might be better to treat it as a new software component and pass the inputs/outputs back to FISSURE

Zach Kost-Smith12:36 PM
Looking through the screenshots, what would it take to get a dark theme? 😉

Chris Poore12:36 PM
make a python wrapper around whatever is controlling your application

ViPeR5000 joined  the room.12:36 PM

Chris Poore12:36 PM
It's all PyQt

Andre Lewis12:37 PM
Seems like a very cool project and well fleshed out already :)

Chris Poore12:37 PM
I can look into different themes

Thomas Shaddack12:37 PM
I heard about encoding the pulse-per-second sync from GPS into the signal as some weak sequence, and then autocorrelating it out for precision timestamp for syncing data from multiple stations.

Paulmsam12:37 PM

Paulmsam12:37 PM
i have it running in VB. seems to work fine.

Chris Poore12:38 PM
Running in VMs will be tricky with certain types of hardware

Chris Poore12:39 PM
Docker can also be a possibility in the future

Paulmsam12:39 PM
with the hack rf seems ok. did some captures of a 2.4ghz photographic transmitter.

Sergio Kviato joined  the room.12:40 PM

Chris Poore12:41 PM
At this stage, I'm working on getting more information out to the public and I'm looking for people to provide suggestions

Chris Poore12:41 PM
There is a discussions tab in the GitHub

kjansky112:41 PM
Would be interesting to see what could be done with Starlink signals

Chris Poore12:41 PM
There is a Discord server if you want to chat about anything https://discord.gg/JZDs5sgxcG

Zach Kost-Smith12:42 PM
Is the GUI key, or can everything also be accessed via a CLI?

Thomas Shaddack12:42 PM
@kjansky1 could be fun to have a grid of ground stations and use the starlink birds (and/or the gnss ones) as sources of known signals for atmospheric/ionospheric tomography. weather radar on steroids.

Discussions