SlideShare a Scribd company logo
RF Hacking 101
Hrishikesh Somchatwar
About me ● My name is Hrishikesh Somchatwar
● OWASP Nagpur Chapter Leader
● Engineering Student
● Loves Hardware and Wireless
● Just a noob trying to share knowledge
● Twitter Handle @8080hex (I like getting msgs)
Disclaimer:
We are talking about Hacking with
Radio Frequencies so don’t expect
to learn Wi-Fi hacking here.
Why RF?
● Because everything is wireless!
● Radio Frequencies are everywhere!
● Internet of Things (IoT) devices use RF
communication
Current
scenario with
RF hacking
Source:
https://thehackernews.com/s
earch/label/radio%20hacking
RF Basics
Physics Baby!
● Frequencies!
RF basics
Image Source:
http://itlaw.wikia.com/wiki/Fre
quency
● If the frequency is between 3KHz - 300 GHz
then its a radio wave.
● In simple words, frequency is the no. of
cycles a radio wave completes in a given time
duration. Usually the time duration is
measured in seconds. So the no of cycles per
second is the frequency of the radio waves.
RF basics
Physics baby!
● IoT devices communicate over wireless
protocols.
● They use EM Waves for communication
Electromagnetic waves.
● Electromagnetic waves can be Radio
waves, Microwaves, Infrared radiation,
visible light, Ultraviolet light, X-rays etc
● So how do you classify them?
RF Basics
Physics baby!
Radio frequencies are described as multiples of
hertz –
● KHz, kilohertz : thousand cycles per
second.
● MHz, megahertz : million cycles per second.
● GHz, gigahertz : billion cycles per second.
RF Basics
Physics Baby!
The process of mixing/adding our data into the
carrier wave is termed as modulation.
Carrier wave is used for carrying something.
RF Basics
Tx/Rx
Transmitter (Tx)- It is a device used to generate and
transmit radio waves.
Receiver (Rx)- It is a device used to receive radio
waves transmitted by the transmitter.
Transceiver (Rx/Tx) - A device capable of sending
and receiving the radio waves is called as a
transceiver
We need a hardware device to capture radio signal
and a software to analyze the signals.
Hardware
Some device is capable of just capturing/receiving the signal and
some are capable of transmitting and receiving the signal. A device
which can receive/capture the signal is called as a receiver or RX and
a device which can receive and transmit the signal is called
transceiver or RX/TX. Below is the list of device along with the
capability
RF
Hardware
HackRF
● Rx/Tx
● 1Mhz-6Ghz
● open source
hardware
Img Src: https://greatscottgadgets.com/images/h1-
preliminary1-445.jpeg
RF Hardware
RTL-SDR
● Rx Only
● 24MHz-1766MHz
● Cheap
Cannot discuss about all the available
hardware in the market
RF Protocols
● Zigbee
● BLE
● Wi-Fi
● IEEE 802.15.4
● z-wave
DEMO
WE ARE NOT RESPONSIBLE
FOR ANY ILLEGAL ACTIONS
DONE BY YOU
Q/A Session
Thanks!

More Related Content

Similar to OWASP Nagpur Meet #3 RF Hacking 101

Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
Sudip Gupta
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
Rfidppt398 (1)
Rfidppt398 (1)Rfidppt398 (1)
Rfidppt398 (1)jothi1
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx
NameetDaga1
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
NSConclave
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
cairo university
 
Remote control
Remote controlRemote control
Remote control
Riaz_raj
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
Ali Moradi
 
IoT Connectivity with LoRa
IoT Connectivity with LoRaIoT Connectivity with LoRa
IoT Connectivity with LoRa
Andri Yadi
 
Ayu 20110320 id
Ayu 20110320 idAyu 20110320 id
Ayu 20110320 id
wn393
 
iaetsd Modern e aid to dementia patients
iaetsd Modern e  aid to dementia patientsiaetsd Modern e  aid to dementia patients
iaetsd Modern e aid to dementia patients
Iaetsd Iaetsd
 
RF transmitter & receiver
RF transmitter & receiverRF transmitter & receiver
RF transmitter & receivercodexdesign
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
rajeshplacherikunnel
 
Home appliances control using RF communication
Home appliances control using RF communicationHome appliances control using RF communication
Home appliances control using RF communication
Chittaranjan Baliarsingh
 

Similar to OWASP Nagpur Meet #3 RF Hacking 101 (20)

Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Rfid Basics Qed
Rfid Basics QedRfid Basics Qed
Rfid Basics Qed
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Wireless
WirelessWireless
Wireless
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
Rfidppt398 (1)
Rfidppt398 (1)Rfidppt398 (1)
Rfidppt398 (1)
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
 
Remote control
Remote controlRemote control
Remote control
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
IoT Connectivity with LoRa
IoT Connectivity with LoRaIoT Connectivity with LoRa
IoT Connectivity with LoRa
 
Ayu 20110320 id
Ayu 20110320 idAyu 20110320 id
Ayu 20110320 id
 
iaetsd Modern e aid to dementia patients
iaetsd Modern e  aid to dementia patientsiaetsd Modern e  aid to dementia patients
iaetsd Modern e aid to dementia patients
 
RF transmitter & receiver
RF transmitter & receiverRF transmitter & receiver
RF transmitter & receiver
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
Home appliances control using RF communication
Home appliances control using RF communicationHome appliances control using RF communication
Home appliances control using RF communication
 

More from OWASP Nagpur

Fortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
Fortifying Ruby on Rails Web Application Framework Security by Sahil TembhareFortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
Fortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
OWASP Nagpur
 
Open Source Everything
Open Source EverythingOpen Source Everything
Open Source Everything
OWASP Nagpur
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
OWASP Nagpur
 
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and ProfitOWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
OWASP Nagpur
 
DevSecOps Introduction Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
DevSecOps Introduction    Tushar Joshi - Owasp Nagpur Meetup 12 May 2019DevSecOps Introduction    Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
DevSecOps Introduction Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
OWASP Nagpur
 
OWASP Nagpur Meet #3 Android RE
OWASP Nagpur Meet #3 Android REOWASP Nagpur Meet #3 Android RE
OWASP Nagpur Meet #3 Android RE
OWASP Nagpur
 
OWASP Nagpur Meet #4
OWASP Nagpur Meet #4 OWASP Nagpur Meet #4
OWASP Nagpur Meet #4
OWASP Nagpur
 

More from OWASP Nagpur (7)

Fortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
Fortifying Ruby on Rails Web Application Framework Security by Sahil TembhareFortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
Fortifying Ruby on Rails Web Application Framework Security by Sahil Tembhare
 
Open Source Everything
Open Source EverythingOpen Source Everything
Open Source Everything
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
 
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and ProfitOWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
OWASP Nagpur - Attacking Web Applications Business Logic for Fun and Profit
 
DevSecOps Introduction Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
DevSecOps Introduction    Tushar Joshi - Owasp Nagpur Meetup 12 May 2019DevSecOps Introduction    Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
DevSecOps Introduction Tushar Joshi - Owasp Nagpur Meetup 12 May 2019
 
OWASP Nagpur Meet #3 Android RE
OWASP Nagpur Meet #3 Android REOWASP Nagpur Meet #3 Android RE
OWASP Nagpur Meet #3 Android RE
 
OWASP Nagpur Meet #4
OWASP Nagpur Meet #4 OWASP Nagpur Meet #4
OWASP Nagpur Meet #4
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

OWASP Nagpur Meet #3 RF Hacking 101