This article is about RF hacking. So this is not the case ... Let's take a look at the key wireless unlocking device. Usually our first step in hacking a wireless device is to find the target's operating frequency. We can find the wireless device database via the FCC ID that comes with each wireless device or we can use a wireless spectrum device to find it. The USRP and Gnuradio-toolkit are here to play the role of spectrum analysis ... We can see that its operating frequency is very common in 433Mhz.
And each time the unlocking signal is sent there is only one signal peak. We can boldly assume that this is the use of ask/ook modulation. Compared with the 2 signal peaks of FSK modulation, there is a distinct difference.
After judging the working frequency, we can receive and analyze the signal from this wireless unlocking device by software radio receiving software GQRX and signal analysis software audacity. Did the little friends see the rules? 0000 1101 ... And every time, it's the same. Doesn't seem to have any encryption.
After analyzing the signal law, we can use Gnuradio and gnuradio-companion to capture and replay the unlocking signal ... See the video for specific effects. The final summary: Some small partners may not have this "security lock" on hand. But don't worry, take a closer look around? Maybe you already have a wireless null remote or Goddess's garage access?
Original address: http://www.freebuf.com/articles/wireless/27306.html
Gnuradio Simple Application