Direction-Finding With Help From The Steam Deck

Direction-finding, or fox hunting, is a popular activity in ham radio circles where a group of people armed with radios attempt to locate a broadcasting source. Besides being a hobby for amateurs, it’s also a necessary tool in the belt of regulators who are attempting to track down violators of the air space. There are a lot of ways to figure out the precise location of a radio transmission, but this one manages to pull it off using both a boat and a Steam Deck, each armed with a software-defined radio.

This project comes to us from [Aaron] who is well known in the amateur radio circles for his SDR-focused Linux distribution called DragonOS; which has all the tools needed for a quality SDR experience, in this case KrakenSDR and DF Aggregator. He’s loaded everything up on a Steam Deck and left that in a secure location on the shore of a lake, while he carries second device with the same software with him on a boat. With the two devices listening for a specific signal, he’s able to quickly zero in on his friend on the shore who is broadcasting on the 70 cm band thanks to the help of all of these software packages.

While ham radio isn’t always known for being a youthful and exciting activity, the advent of software-defined radio and other digital modes seem to be shaking things up in that world. Certainly speeding around a lake on a boat is fun on its own as well, and a fox hunt like this can be done with something as small and simple as a Raspberry Pi too.

Continue reading “Direction-Finding With Help From The Steam Deck”

TRX-Duo Is A Red Pitaya Clone For Software Defined Radio

If you’ve noticed the TRX-DUO software-defined radio transceiver, you might have wondered how it stacks up to other choices like Red Pitaya or HackRF.  [Tech Minds] obliges with a review of the Red device in the video below.

While this unit isn’t inexpensive, it also isn’t as expensive as some of its competitors. Sure, you can pick up an RTL-SDR dongle for a fraction of the price, but then you miss out on transmitting. The device is pretty powerful compared to a cheap software defined radio:

  • Frequency: 10 kHz to 60 MHz
  • CPU: Zynq SoC with a dual-core ARM Cortex A9
  • RAM: 512 MB
  • OS: Linux
  • Connectivity: Ethernet and USB connectivity (WiFi with a dongle)
  • ADC: 16-bit at 125 MS/s (2 channels)
  • DAC: 14-bit at 125 MS/s (2 channels)

The board boots off an SD card and there are several to choose from. The video shows two different images. One has a number of applications that run on the device and will also run on a Red Pitaya. The device shows a browser menu with various options and the result is quite impressive. Using the box as a WSPR beacon, it was heard fairly well given the low output power. It was, however, able to hear the world easily.

You can get a less capable Red Pitaya model for about $100 less than the going price. However, for something comparable, you will pay more for the Red Pitaya and — depending on capabilities — perhaps a lot more, although you do get more capability for the increased price.

You can do a lot more with a transmitting SDR — having both transmit and receive opens up many new projects. Of course, canned applications are great, but if you get one of these, you are going to want to try GNU Radio.

Continue reading “TRX-Duo Is A Red Pitaya Clone For Software Defined Radio”

London Bridge Has Fallen — By Radio

One of the global news stories this week has been the passing of the British monarch, Queen Elizabeth II. Since she had recently celebrated 70 years on the throne, the changing of a monarch is not something that the majority of those alive in 2022 will have seen. But it’s well known that there are a whole suite of “London Bridge has fallen” protocols in place for that eventuality which the various arms of the British government would have put in motion immediately upon news from Balmoral Castle. When it became obvious that the Queen’s health was declining, [Hackerfantastic] took to the airwaves to spot any radio signature of these plans. [Update 2022-09-11] See the comments below and a fresh Tweet to clarify, it appears these were not the signals they were at first suspected to be.

What he found in a waterfall view of the 4 MHz military band was an unusual transmission, a set of strong QPSK packets that started around 13:40pm on the 8th of September, and continued on for 12 hours before disappearing.  The interesting thing about these transmissions is not that they were a special system for announcing the death of a monarch, but that they present a rare chance to see one of the country’s Cold War era military alert systems in action.

It’s likely that overseas embassies and naval ships would have been the intended recipients and the contents would have been official orders to enact those protocols, though we’d be curious to know whether 2022-era Internet and broadcast media had tipped them off beforehand that something was about to happen. It serves as a reminder: next time world news stories happen in your part of the world, look at the airwaves!

Tracking Weather Balloons With SDR

The advent of cheap software-defined radio hardware means that what would have once been an exotic expensive undertaking can now be relatively cheap. [David] notes that using some pretty simple gear, he could track down weather balloons.

The U.S. National Weather Service sends up a large number of radiosondes attached to balloons twice a day. Their job is to measure conditions at high altitudes up to about 30km. Once the balloon gets too high, the pressure inside bursts the balloon, and a small parachute slows the instrument package’s descent back to Earth. [David] wanted to track these down and return them to the NWS for reuse.

Continue reading “Tracking Weather Balloons With SDR”

Introducing FISSURE: A Toolbox For The RF Hacker

No matter what the job at hand is, if you’re going to tackle it, you’re going to need the right kit of tools. And if your job includes making sense out of any of the signals in the virtual soup of RF energy we all live in, then you’re going to need something like the FISSURE RF framework.

Exactly what FISSURE is is pretty clear from its acronym, which stands for Frequency Independent SDR-Based Signal Understanding and Reverse Engineering. This is all pretty new — it looks like [Chris Poore] presented a talk at DEFCON a few weeks back about using FISSURE to analyze powerline communications between semi-trucks and their trailers, and they’ve got a talk scheduled for next month’s GNU Radio Conference as well. We’ve been looking through all the material we can find on FISSURE, and it appears to be an RF hacker’s dream come true. They’ve got a few examples on Twitter, like brute-forcing an old garage door opener with a security code set by a ten-position DIP switch, and sending tire pressure monitoring system (TPMS) signals to a car. They also mention some of the framework’s capabilities on the GitHub README; we’re especially interested in packet crafting for various protocols. The video below has some more examples of what FISSURE can do.

It looks like FISSURE could be a lot of fun, and very handy for your RF analysis and reverse engineering work. If you’ve been using Universal Radio Hacker like we have, this looks similar, only more so. We’ll be downloading it soon and giving it a try, so be on the lookout for a hands-on report.

Continue reading “Introducing FISSURE: A Toolbox For The RF Hacker”

Simple Breadboard SDR For Shortwave

One of the best ways to learn about radios is to build your own, even in the age of cheap SDR dongles. [Aniss Oulhaci] demonstrates this with a simple HF SDR receiver built on a breadboard.

The receiver takes the form of a simplified Tayloe detector. An RF preamp circuit amplifies the signal from a shortwave antenna and feeds it into a 74HC4066D analog switch, which acts as a switching mixer. It mixes the input signal with the local oscillator’s I and Q signals to produce the intermediate frequency signals. The local oscillator consists of a SI5351 clock generator with a 74HC74D flip-flop to generate the I and Q pair. The signals pass through a low pass filter stage and get amplified by an LM358 op amp, resulting in the IQ signal pair being fed to a computer’s stereo sound card.

An Arduino is used to control the SI5351 clock generator, which in turn is controlled by the same program created for the SDR Shield. With the audio signal fed to HDSDR, [Aniss] was able to pick up a shortwave radio broadcaster.

While this is by no means a high-performance receiver, building an SDR on a breadboard is still a great weekend project, with plenty of potential for further experimentation.

Continue reading “Simple Breadboard SDR For Shortwave”

SATAn Turns Hard Drive Cable Into Antenna To Defeat Air-Gapped Security

It seems like [Mordechai Guri]’s lab at Ben-Gurion University is the place where air-gapped computers go to die, or at least to give up their secrets. And this hack using a computer’s SATA cable as an antenna to exfiltrate data is another example of just how many side-channel attacks the typical PC makes available.

The exploit, deliciously designated “SATAn,” relies on the fact that the SATA 3.0 interface used in many computers has a bandwidth of 6.0 Gb/s, meaning that manipulating the computer’s IO would make it possible to transmit data from an air-gapped machine at around 6 GHz. It’s a complicated exploit, of course, and involves placing a transmitting program on the target machine using the usual methods, such as phishing or zero-day exploits. Once in place, the transmitting program uses a combination of read and write operations on the SATA disk to generate RF signals that encode the data to be exfiltrated, with the data lines inside the SATA cable acting as antennae.

SATAn is shown in action in the video below. It takes a while to transmit just a few bytes of data, and the range is less than a meter, but that could be enough for the exploit to succeed. The test setup uses an SDR — specifically, an ADALM PLUTO — and a laptop, but you can easily imagine a much smaller package being built for a stealthy walk-by style attack. [Mordechai] also offers a potential countermeasure for SATAn, which basically thrashes the hard drive to generate RF noise to mask any generated signals.

While probably limited in its practical applications, SATAn is an interesting side-channel attack to add to [Dr. Guri]’s list of exploits. From optical exfiltration using security cameras to turning power supplies into speakers, the vulnerabilities just keep piling up.

Continue reading “SATAn Turns Hard Drive Cable Into Antenna To Defeat Air-Gapped Security”