In this post I will explain the possible applications of your PandwaRF (Rogue & Marauder), and what you can achieve in real life with it.
PandwaRF is a test equipment for RF systems. It has not been tested for compliance with the regulations governing the transmission of radio signals. You are responsible for using your PandwaRF legally. The intentional jamming of RF signals is ILLEGAL. PandwaRF should only be used for testing the robustness of your own devices.
With a PandwaRF Rogue you can:
- Perform a Spectrum Analyzer of the common Sub-1GHz ISM bands: 315/433/868/915 MHz
- Receive keyfobs transmission (car, alarm, gate opener, …)
- Replay captured transmission from keyfobs
- Replay a modified captured transmission
- Transmit your own custom payload
- Capture encrypted RF frame of a gate opener and decipher it (with Kaiju) to generate valid rolling codes
- Capture RF data and transmit it on another frequency
- Brute force wireless devices (alarms, gate openers etc)
- Do a De Bruijn RF brute force attack
- Find the frequency used by a RF device
- Measure the data rate of a transmission
- Reverse engineer unknown protocols (but I strongly recommend using URH instead)
- Check the RF jam-resistance of your own devices
- Send captured data to a server for post-processing
- Use the PandwaRF Android SDK to develop your own Android application
With a PandwaRF Marauder, the usage is much more specific, as Marauder is designed to do only one thing: recording RF transmissions silently.
So here are the steps to use a PandwaRF Marauder:
- Configure the frequency to be recorded using the Android application
- Start the Marauder & place it somewhere there are interesting RF transmissions to capture
- Go get a coffee or watch a movie
- Come back later & pick the Marauder back
- Download all captured data from Marauder to the Android application
- Send all captured data to Kaiju for rolling code analysis
Check also our training course for Law Enforcement Agencies and Police!