Universal Radio Hacker v2.9.3 releases: investigate wireless protocols like a boss
The Universal Radio Hacker (URH) is a tool for analyzing unknown wireless protocols. With the rise of the Internet of Things (IoT) such protocols often appear in the wild. Many IoT devices operate on frequencies like 433.92 MHz or 868.3 MHz and use proprietary protocols for communication. Reverse-engineering such protocols can be fascinating (»What does my fridge talks about?«) and reveal serious security leaks e.g. when bypassing smart alarm systems and door locks.
The Universal Radio Hacker is a software for investigating unknown wireless protocols. Features include
- hardware interfaces for common Software Defined Radios
- easy demodulation of signals
- assigning participants to keep an overview of your data
- customizable decodings to crack even sophisticated encodings like CC1101 data whitening
- assign labels to reveal the logic of the protocol
- fuzzing component to find security leaks
- modulation support to inject the data back into the system
With the rise of the Internet of Things (IoT) such protocols often appear in the wild. Many IoT devices operate on frequencies like 433.92 MHz or 868.3 MHz and use proprietary protocols for communication. Reverse-engineering such protocols can be fascinating (»What does my fridge talks about?«) and reveal serious security leaks e.g. when bypassing smart alarm systems and door locks.
So how can we join this game? Software Defined Radios (SDR) are the answer for this. Such devices allow sending and receiving on nearly arbitrary frequencies. Such devices allow sending and receiving on nearly arbitrary frequencies.
Like the name suggests SDRs need software to be properly operated. This is where the Universal Radio Hacker comes into play: It takes the samples from the SDR and transforms them into binary information (bits). But this is only the beginning: URH is designed to help you throughout the entire process of attacking the wireless communication of IoT devices.
In the upcoming sections, you will learn how to use URH and reverse engineer wireless protocols in minutes.
Supported devices
Changelog
v2.9.3
- requirements: restrict pyqt5 version due to PyInstaller issue by @jopohl in #862
- add bias tee check box on device settings by @sophiekovalevsky in #854
- add category HamRadio to desktop file by @andynoack in #889
- Signal: retain the sample_rate on create_new by @kadamski in #884
- Simulation fix: use sending device dtype for modulation by @jopohl in #918
- Variable type mismatch, fix #937 by @andynoack in #938
- CI: update python versions by @jopohl in #940
- CI: Migrate to GitHub Actions by @jopohl in #942
- remove HackRF anti-freeze timeouts in places that do not require them by @nilswint in #890
- add b before data string by @andynoack in #846
- update dependencies by @jopohl in #944
- Fix microphone access for macOS DMG by @jopohl in #945
- get magnitudes in cython for less memory consumption by @jopohl in #946
- join simulation thread when simulation stopped by @jopohl in #947
- Update year in LICENSE by @jopohl in #948
- add default noise threshold setting by @jopohl in #949
- Fix cython warnings by @jopohl in #951
- CI: trigger on version tags by @jopohl in #952
- MacOS: Add default include dir during installation by @jopohl in #953
- set BladeRF min sample rate to 520.834 kHz by @jopohl in #954
- Fix API check on macOS by @jopohl in #955
- fix #933 improve y-scale in SendRecvDialog by @jopohl in #956
- Enable native backend check on Windows by @jopohl in #957
- Update Windows SDR drivers by @jopohl in #958
- Update SDR drivers on macOS by @jopohl in #959
- update requirements.txt by @jopohl in #960
Download
Tutorial
Demo
Universal Radio Hacker Copyright (C) 2017 Johannes Pohl and Andreas Noack
Source: https://github.com/jopohl/urh