This allows you to read key fobs like modern wireless car key fobs, garage door
openers, ceiling fan remotes and many other devices that use sub-GHz
frequencies. My first attempt to clone my wireless car key fob and garage door failed.
This will only work with some kinds of wireless, usually older doorbells-Ring
or Nest doorbells are probably safe-and you need to first read the doorbell to get the right frequency,
but if you do that, you can play ding-dong-ditch from a distance.
This blog post will focus on Sub-GHz and one potential abuse of capturing Sub-GHz
signals. In this blog post, I am going to be exploring one potential physical security attack chain, relaying a
captured signal to open a gate using a device called the Flipper Zero.
Perhaps the most surprising thing when I started playing with my Flipper Zero
was how far it could transmit. While I acknowledge
that modified versions of Flipper firmware exist with additional functionality and less
restrictions, for the sake of simplicity and to better demonstrate the low barrier
to entry for a potential attacker, a standard Flipper Zero was used for this experiment.
The Flipper Zero was mounted on an all dielectric (plastic) 2-axis positioner and moved through hundreds of orientations while the
far field radiated signal level was measured.
Url:
https://theflipperzerozone.com/Flipper-Remote-Hack-Cyber-Remote-Hacking-Made-Simple.html
Main category:
Sub category:
Tags:
1983
Added:
13-03-2024