SlideShare a Scribd company logo
Radio Hacking – Part 1
- Nitesh Malviya
About me?
 Information Security enthusiast
 Security Consultant at Payatu Technologies
 Love - IoT and Wireless Technology
 Blog – nitmalviya03.wordpress.com
 Twitter – nitmalviya03
What is a Radio?
Building Blocks of a Radio
Transmitter
Receiver
Problems with traditional radio
 Different set of hardware for different type of communication.
 Different radio types could not communicate with each other.
 Could be costlier.
 Those systems were designed to work with certain waveforms only.
SDR in easy words
 Refers to a technique in which all the processing is done in software.
 The processing mentioned include mixing, filtering, demodulation etc
 The software can be used to implement different demodulation scheme
and different standards can be implemented in the same device.
 The software can be updated so the device doesn’t become obsolete with
time.
Hardware Radio:
Separate devices for separate functions
Software Defined Radio:
One Device for everything
SDR Working
Types of SDR
RTL – SDR
Range: 52 – 2200 MHz
Bandwith: 2.4 Mhz
AirSpy
Range: 24 – 1750 MHz
Bnadwith: 10 Mhz
HackRF
Range: 1 MHz – 6 GHz
Bandwith: 20 Mhz
BladeRF
Range: 300 MHz – 3.8 GHz
Bandwith: 28 MHz
USRP
Range: 70 MHz – 6 GHz
Bandwith: 61.44 MHz
DSP Basics and Theory
https://nitmalviya03.wordpress.com/2017/08/23/getting-started-with-radio-
waves-hacking-part-1-radio-frequency-basics-and-theory/
TOOLS
 GQRX
 RTL-SDR
 Rfcat/HackRF
 GNU-RADIO
 AUDACITY
Demo Time?
voice channels??
ADS-B
GNURadio
 It is a free software development toolkit that provides signal processing
blocks to implement software-defined radios and signal-processing
systems.
 The GNU Radio infrastructure is written entirely in C++, and many of the
user tools are written in Python.
 The GNU Radio environment is designed to do real-time signal
processing.
GNURadio plotting
Demo Time?
Basic GNU Blocks
FM Receiver
THANK YOU

More Related Content

PDF
An IDS for Secure Visible Light Communication on Android Devices
PPTX
pp mobile computing
PPTX
What is nfc(3)
PPTX
Ids presentation
PPT
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
PPSX
Near Field Communication (NFC)
PDF
Border security
PPT
Bluetooth based-smart-sensor-network
An IDS for Secure Visible Light Communication on Android Devices
pp mobile computing
What is nfc(3)
Ids presentation
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Near Field Communication (NFC)
Border security
Bluetooth based-smart-sensor-network

What's hot (20)

PDF
How The Richard Rose Academy Transformed Into an 802.11ac Powerhouse Overnight
PPTX
PPT
Wireless sensor network
PPTX
Cellular communication system
PPTX
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
A_Seyedolhosseini_Tir_95_1
PDF
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
PPTX
wireless net workes
PDF
ConnectiKR0N - Presentation for LiDAR
PPTX
Bluetooth network-security-seminar-report
PDF
Z wave
PDF
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
PPT
Concentris Systems Overview
PPTX
blutooth based smart sensor network
PDF
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
PPTX
Presentation
PPTX
Created by narsa ram
PPSX
Enhanced guarding
PPT
Wlan networking and security
How The Richard Rose Academy Transformed Into an 802.11ac Powerhouse Overnight
Wireless sensor network
Cellular communication system
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Intrusion detection systems in wireless sensor networks
A_Seyedolhosseini_Tir_95_1
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
wireless net workes
ConnectiKR0N - Presentation for LiDAR
Bluetooth network-security-seminar-report
Z wave
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Concentris Systems Overview
blutooth based smart sensor network
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
Presentation
Created by narsa ram
Enhanced guarding
Wlan networking and security

Similar to Radio hacking - Part 1 (20)

PDF
Radio Stuff Hacking - Linux Day 2018
PDF
SDR 101 - NDSU CyberSecurity 2017
PDF
SDR101-presentation-distro
PDF
Hacking RF based IoT devices
PPTX
Software defined radio and the hacker
PDF
SDR Basestation with Raspberry Pi
PPTX
BSides Lisbon 2017 - Fantastic Signals and Where to Find Them
PDF
BSidesMSP 2017 - SDR101 workshop
PPTX
RF Experiments in Raspberry Pi
PDF
Software defined radio
PDF
Getting started with sdr
PPT
cr2016-L1.ppt Cognitive radio for wireless
PPTX
Software Defined Radio With RTL-SDR
PPTX
All your wireless devices belongs to me
PPTX
PDF
Software Defined Radio
PDF
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
PDF
Final Report of Project A Low
PPTX
Software Defined Radio (SDR) By Deepak Lodha
PPT
SDR The Future of Radio for cognitive radio.ppt
Radio Stuff Hacking - Linux Day 2018
SDR 101 - NDSU CyberSecurity 2017
SDR101-presentation-distro
Hacking RF based IoT devices
Software defined radio and the hacker
SDR Basestation with Raspberry Pi
BSides Lisbon 2017 - Fantastic Signals and Where to Find Them
BSidesMSP 2017 - SDR101 workshop
RF Experiments in Raspberry Pi
Software defined radio
Getting started with sdr
cr2016-L1.ppt Cognitive radio for wireless
Software Defined Radio With RTL-SDR
All your wireless devices belongs to me
Software Defined Radio
[HES2014] HackRF A Low Cost Software Defined Radio Platform by Benjamin Vernoux
Final Report of Project A Low
Software Defined Radio (SDR) By Deepak Lodha
SDR The Future of Radio for cognitive radio.ppt

More from nullowaspmumbai (20)

PDF
ELK in Security Analytics
PPTX
Switch security
PPTX
How I got my First CVE
PPTX
Power forensics
PPTX
Infrastructure security & Incident Management
PPTX
Middleware hacking
PPTX
Internet censorship circumvention techniques
PPTX
How i got my first cve
PPTX
Adversarial machine learning updated
PPTX
PPTX
Adversarial machine learning
PPTX
Dll Hijacking
PPTX
Abusing Target
PDF
NTFS Forensics
PPTX
Drozer - An Android Application Security Tool
PPTX
Middleware hacking
PDF
Ganesh naik linux_kernel_internals
PDF
Buffer overflow null
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
ELK in Security Analytics
Switch security
How I got my First CVE
Power forensics
Infrastructure security & Incident Management
Middleware hacking
Internet censorship circumvention techniques
How i got my first cve
Adversarial machine learning updated
Adversarial machine learning
Dll Hijacking
Abusing Target
NTFS Forensics
Drozer - An Android Application Security Tool
Middleware hacking
Ganesh naik linux_kernel_internals
Buffer overflow null
Null Mumbai Meet_Android Reverse Engineering by Samrat Das

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

Radio hacking - Part 1

  • 1. Radio Hacking – Part 1 - Nitesh Malviya
  • 2. About me?  Information Security enthusiast  Security Consultant at Payatu Technologies  Love - IoT and Wireless Technology  Blog – nitmalviya03.wordpress.com  Twitter – nitmalviya03
  • 3. What is a Radio?
  • 4. Building Blocks of a Radio Transmitter Receiver
  • 5. Problems with traditional radio  Different set of hardware for different type of communication.  Different radio types could not communicate with each other.  Could be costlier.  Those systems were designed to work with certain waveforms only.
  • 6. SDR in easy words  Refers to a technique in which all the processing is done in software.  The processing mentioned include mixing, filtering, demodulation etc  The software can be used to implement different demodulation scheme and different standards can be implemented in the same device.  The software can be updated so the device doesn’t become obsolete with time.
  • 7. Hardware Radio: Separate devices for separate functions Software Defined Radio: One Device for everything
  • 9. Types of SDR RTL – SDR Range: 52 – 2200 MHz Bandwith: 2.4 Mhz AirSpy Range: 24 – 1750 MHz Bnadwith: 10 Mhz
  • 10. HackRF Range: 1 MHz – 6 GHz Bandwith: 20 Mhz BladeRF Range: 300 MHz – 3.8 GHz Bandwith: 28 MHz USRP Range: 70 MHz – 6 GHz Bandwith: 61.44 MHz
  • 11. DSP Basics and Theory https://nitmalviya03.wordpress.com/2017/08/23/getting-started-with-radio- waves-hacking-part-1-radio-frequency-basics-and-theory/
  • 12. TOOLS  GQRX  RTL-SDR  Rfcat/HackRF  GNU-RADIO  AUDACITY
  • 15. ADS-B
  • 16. GNURadio  It is a free software development toolkit that provides signal processing blocks to implement software-defined radios and signal-processing systems.  The GNU Radio infrastructure is written entirely in C++, and many of the user tools are written in Python.  The GNU Radio environment is designed to do real-time signal processing.