Skip to content

Android Fragment RF Brute Force

Djamil Elaidi edited this page Dec 13, 2016 · 12 revisions

PandwaRF has an integrated brute force feature. It can send many RF codes consecutively, and supports multiple types of encoding. Brute force mechanism runs entirely on the PandwaRF board, not on the smartphone, making it faster than a normal data transmission from smartphone (RX/TX page) or a JavaScript.

PandwaRF_Android_RF_Brute_Force.png

Parameters that need to be set up before use

  • Target Frequency in Hz: the range is [300000000, 928000000] Hz
  • Target Data rate: you can go as high as 100000 Bits/s
  • Target Modulation: 2-FSK, GFSK, MSK, ASK, and OOK modulation formats are supported
  • Target code length: this is the key size that PandwaRF will attack. As the code length increases, the amount of time to find the correct code increases exponentially.
  • Target start & stop values: specify the range of possible code to try. Can be used if you want to restart a previous brute force to where you stopped previously.

Project Information

PandwaRF Android Application (Normal Mode)

PandwaRF Android Application (Dev Mode)

Marauder Android Application

iOS Application

Linux

Hardware

For developers

Support

Gimme moar!

Clone this wiki locally