❌

Reading view

There are new articles available, click to refresh the page.

Introducing LoRa (Long Range) Wireless Technology – Part 1

Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across […]

The post Introducing LoRa (Long Range) Wireless Technology – Part 1 appeared first on Black Hills Information Security, Inc..

Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner

Ray Felch // IntroductionΒ  Recently, I came across an interesting article on using software-defined radio (SDR) to create aΒ Police, Fire,Β EMS,Β and Public Safety systems scanner. Viewing a few of these Trunk […]

The post Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner appeared first on Black Hills Information Security, Inc..

Information From Thin Air: Using SDR to Extract DTMF from Radio Waves

Ray Felch // DisclaimerΒ  When using an FM transmitter, do notΒ modifyΒ the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain […]

The post Information From Thin Air: Using SDR to Extract DTMF from Radio Waves appeared first on Black Hills Information Security, Inc..

Machine-in-the-Middle (MitM) BLE Attack

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of […]

The post Machine-in-the-Middle (MitM) BLE Attack appeared first on Black Hills Information Security, Inc..

Promiscuous Wireless Packet Sniffer Project

Ray Felch // Introduction: After completing and documenting my recent research into keystroke injections (Executing Keyboard Injection Attacks), I was very much interested in learning the in-depth technical aspects of […]

The post Promiscuous Wireless Packet Sniffer Project appeared first on Black Hills Information Security, Inc..

Executing Keyboard Injection Attacks

Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://github.com/BastilleResearch/mousejack), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, […]

The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security, Inc..

How To Replay RF Signals Using SDR

Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any […]

The post How To Replay RF Signals Using SDR appeared first on Black Hills Information Security, Inc..

GSM Traffic and Encryption: A5/1 Stream Cipher

Ray FelchΒ // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

The post GSM Traffic and Encryption: A5/1 Stream Cipher appeared first on Black Hills Information Security, Inc..

Intro to Software Defined Radio and GSM/LTE

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. […]

The post Intro to Software Defined Radio and GSM/LTE appeared first on Black Hills Information Security, Inc..

How to Hack Hardware using UART

Raymond Felch // Preface: I began my exploration of reverse-engineering firmware a few weeks back (see β€œJTAG – Micro-Controller Debuggingβ€œ), and although I made considerable progress finding and identifying the […]

The post How to Hack Hardware using UART appeared first on Black Hills Information Security, Inc..

JTAG – Micro-Controller Debugging

Raymond Felch // Being an embedded firmware engineer for most of my career, I quickly became fascinated when I learned about reverse engineering firmware using JTAG. Β  I decided to […]

The post JTAG – Micro-Controller Debugging appeared first on Black Hills Information Security, Inc..

❌