sabato 30 gennaio 2016

OnePlus One with USB to Seral port Adapter it transmit using crystal osc...

OnePlus One with USB FTDI - Uart Adapter it transmit using crystal oscil...

USB to Seral port Adapter Auto Recognized with OnePlus One

USB FTDI - UART Adapter Auto Recognized with OnePlus One

What you can do with OnePlus One and various device?



What you can do with OnePlus One and various device?

I report a list of peripheral devices and anything else that can be interfaced to OnePlus One ( OPO 1+1).

Soon I will publish the test of various device that has not been published previously.

List of  device in the photos:

- USB to Serial port Adapter
- USB to parallel port Adapter
- USB to FTDI – UART Adapter
- USB to PS2 Adapter
- PS2 to old seral port mouse Adapter
- PS2 to AT Keyboard connector (DIN 5) Adapter
- Mini IDE 2.5 / IDE 3.5 / SATA to USB with externa power Adapter to IDE/ SATA connector Adapter
- Various harddisk IDE / SATA
- Various CD / DVD 3.5 / 2.5 IDE / SATA /Slim IDE
- Slim CD-ROM IDE (ATA) Adapter-Laptop,Server SlimLine mini 4
- USB floppy drive
- USB to LAN 10/100 Adapter
- USB to sim reader Adapter
- OTG cable
- DB9 to DB25 Adapter
- Trendnet USB high power Bluetooth Adapter
- Dongle SDR / DVB / FM / RDS / ADS-B / AIS / APRS / AFSK / Cubesat / Low coast satellite and many other type of radio communication.
- Home made few euro Miracle Whip Clone Antenna
- DVB antenna
- FM antenna
- Indoor DVB-T amplifier antenna
- USB to microsd Adapter
- Pen drive 16gb with miniUSB and USB connector
- USB hub with an eternal power supply
- cable USB male to USB male
- USB female to USB female Adapter
- Kit with various USB to connector Adapter
- USB Car Power Adapter
- USB AAA / AA battery charger
- USB extension cable low
- Low Loss USB Extension Cable
- Card Reader USB with miniUSB and USB connector
- MicroSD reader
- MMC card 1gb
- SD card 2gb
- Microsd card 16gb

Photo of  full device list:


Detail photos:








What you can do with Raspberry Pi 1 Model B+ and various device?



What you can do with Raspberry Pi 1 Model B+ and various device?

I report a list of peripheral devices and anything else that can be interfaced to Raspberry Pi 1 Model B+.

Soon I will publish the test device that has not been published previously.

List of  device in the photos:

- USB to Serial port Adapter
- USB to parallel port Adapter
- USB to FTDI – UART Adapter
- USB to PS2 Adapter
- PS2 to old seral port mouse Adapter
- PS2 to AT Keyboard connector (DIN 5) Adapter
- Mini IDE 2.5 / IDE 3.5 / SATA to USB with externa power Adapter to IDE/ SATA connector Adapter
- Various harddisk IDE / SATA
- Various CD / DVD 3.5 / 2.5 IDE / SATA /Slim IDE
- Slim CD-ROM IDE (ATA) Adapter-Laptop,Server SlimLine mini 4
- USB floppy drive
- USB to LAN 10/100 Adapter
- USB to sim reader Adapter
- DB9 to DB25 Adapter
- Trendnet USB high power Bluetooth Adapter
- Dongle SDR / DVB / FM / RDS / ADS-B / AIS / APRS / AFSK / Cubesat / Low coast satellite and many other type of radio communication.
- Home made few euro Miracle Whip Clone Antenna
- DVB antenna
- FM antenna
- Indoor DVB-T amplifier antenna
- USB to microsd Adapter
- Pen drive 16gb with miniUSB and USB connector
- USB hub with an eternal power supply
- cable USB male to USB male
- USB female to USB female Adapter
- Kit with various USB to connector Adapter
- USB Car Power Adapter
- USB AAA / AA battery charger
- USB extension cable low
- Low Loss USB Extension Cable
- Card Reader USB with miniUSB and USB connector
- MicroSD reader
- MMC card 1gb
- SD card 2gb
- Microsd card 16gb
- Various Audio / Video cable RCA / S-Video / SCART / Composite
- SCART to S-video Adapter
- S-Video to component Adapter
- 3.5MM Earphone jack TO RCA Composite AV AUDIO/VIDEO CABLE FEMALE
- Standard solderless breadboard
- various cable to connect Standard solderless breadboard
- USB to pinout direct cable


Photo of  full device list: 


Detail photos:










domenica 3 gennaio 2016

My old WinRadio Rosetta WR1000 ISA-bus 16 Bit and desktop configuration

My old WinRadio Rosetta WR1000 ISA-bus 16 Bit and desktop configuration


WR-1000i Specifications:


Sensitivity
AM/SSB/CW 10dB S/N
FM-N/FM-W 12dB SINAD
Mode
0.5-1.5 MHz
1.5-30 MHz
30-1000 MHz
1-1.3 GHz
AM
5µV
1µV
1.5µV
5µV
SSB
2.5µV
0.5µV
0.7µV
2.5µV
FM-N
1µV
0.5µV
0.5µV
2µV
FM-W
  -
  -
2µV
4µV
Intermediate frequencies
f [MHz]
IF1 [MHz]
IF2 [MHz]
0.5-299.999
556.325
58.075
300-512.999
249.125
58.075
513-797.999
58.075
  -
798-1105.999
249.125
58.075
1106-1300
556.325
58.075
Mode
IF3 [MHz]
AM,SSB,FM-N
0.455
FM-W
10.7
Frequency stability
10 ppm (0 to 60° C)
Antenna input
50 ohm (BNC connector)
Audio output
0.2W (8 ohm load)























Receiver type
PLL-based triple-conversion superheterodyne
Frequency range
AM, SSB, FM-N
0.5-1300 MHz
FM-W
30-1300 MHz
Note: In some countries certain frequencies may be omitted due to government legislation.
Tuning resolution
100 Hz (BFO: 5 Hz)
Mode
AM, SSB/CW, FM-N, FM-W
Image/Spurious Rejection
0.5 - 513 MHz
   65dB
798-1300 MHz
  40dB
Dynamic range
  65dB
Signal meter linearity
  ± 5dB
Selectivity
AM,SSB/CW
6 kHz @ 6dB
FM-N
17 kHz @ 6dB
FM-W
230 kHz @ 6dB
Scanning speed
AM,SSB/CW
10 channels/s
FM-N, FM-W
50 channels/s
























Desktop configuration:

-Intel Pentium 4 3.0Ghz HyperThreading
-4 Gb di ram kingstone 
-ATI sappire readeon 9250 agp 256Mb, passive, external vga/dvi/svideo
-2 hard disk, dualboot, sata 200gb & pata 80gb



Software installed:

WEFAX (Satellite Weather Fax)
HF Fax
Packet Radio
Aircraft Addressing and Reporting System (ACARS)
Dual Tone Multi-Frequency Signalling (DTMF)
Continuous Tone Coded Squelch System (CTCSS)
Signal Classifier
Audio Oscilloscope and Spectrum Analyzer
Squelch-controlled Audio Recorder and Playback

WiNRADiO Advanced Digital Suite:

Advanced FAX Module (WEFAX and HF Fax) with a scheduler
Advanced NAVTEX Decoder with a scheduler
Advanced Packet Radio Decoder
Advanced ACARS Decoder with a code database
Advanced Signalling Decoder (CTCSS and DTMF) with alarms
Advanced Signal Classifier
Advanced Audio Oscilloscope and Spectrum Analyzer with waterfall spectra
Advanced Signal Conditioner with numerous user-defined filters
Advanced Audio Recorder with pitch shift and speed control

many others XRS PLUGIN. 


Desktop foto:













Sofware example:




 

sabato 2 gennaio 2016

SMART SNIFFING GSM TRAFFIC ON WINDOWS WORKSTATION AND VMWARE WITH HACKRF AND RTL_SDR



SMART SNIFFING GSM TRAFFIC ON WINDOWS WORKSTATION AND VMWARE WITH HACKRF AND RTL_SDR 
 This is a modified procedure found online and tested to ensure functionality
fast, simply, no deploy or compiler ...... 
few step maximum 10 .....
64 bit compatible 



Tools used
VMware Workstation Player
GNU Radio Live SDR Environment
wireshark
hackrf_kalibrate
Install Requirements
Windows system machine with 4gb of ram and dual core processor, hackrf or rtl sdr device.
Installation

  • Download GNU Radio Live SDR Environment
  • Download VMware Workstation Player
  • Install VMware Workstation Player
  • Start VMware Workstation Player
  • Create a new virtual machine , installer disc image file (iso) with GNU Radio Live SDR Environment image
  • Open virtual machine
  • Connect hackrf
  • open terminal and insert hackrf_info and verify the functionality

Found HackRF board.
Board ID Number: 2 (HackRF One)
Firmware Version: 2014.08.1
Part ID Number: 0x00574745 0x00274746
Serial Number: 0x00000000 0x00000000 0x14d473dc 0x2f5339e1

  • Install kalibrate-hackrf, a tool that will hop among known GSM frequencies and will tell you which your country is using:

cd kalibrate-hackrf
./bootstrap
./configure
make
sudo make install

  • Finding GSM Frequencies:

Each operator in each country uses a different frequency in the GSM possible spectrum, which usually starts from 900Mhz. You can use hackrf_kalibrate to find the frequencies you want to sniff:
./kal -s GSM900 -g 40 -l 40
Note the two gain values, those are important in order to get some results. Leave kalibrate running and after a while you should see an output similar to this:


  • open terminal and insert airprobe_rtlsdr.py

you should see an output similar to this:

when you receive see there:


  • close airprobe with Ctrl+z

  •  install wireshark, in the terminal insert sudo apt-get install wireshark

Procedure
Sometimes you might want to see the frequencies in order to ensure correct results from hackrf_kalibrate, or to save yourself from calculating the correct frequency given by hackrf_kalibrate (notice the +/- Khz sign of each result – this means the top peak with the corresponding power,not 100% correct frequency). Open gqrx and tune it to the first frequency you got from hackrf_kalibrate, for example 940.6Mhz, and you’ll see something like the following picture.

  • open terminal and insert ./kal -s GSM900 -g 40 -l 40 and displays the characteristics of the channel

  • open terminal and insert airprobe_rtlsdr.py and center frequency

Once you know the GSM channels frequencies, you can start gr-gsm by running the python script ./airprobe_rtlsdr.py or load the airprobe_rtlsdr.grc file using gnuradio-companion and set one of the channel frequencies you just found in the frequency field. Don’t forget to add ‘gain’ value again, move back to the frequency field and start pressing the UP/DOWN arrows on your keyboard to start scrolling the frequencies in 200Khz steps until you start seeing some data in your console window. The whole process should look something like this:

Now you only need to launch wireshark from another terminal tab with the following command:

  • open terminal and insert sudo wireshark -i lo

you should be able to see decoded GSM traffic sniffed by your hackrf and more.

Usage gr-gsm
There are many possible applications of gr-gsm. At this moment there is one application that is ready out of the box. It is improved replacement of the old Airprobe - the program that lets you receive and decode GSM control messages from timeslot 0 on the broadcasting channel of a BTS. After installation of gr-gsm there are three python executables that will be installed:
airprobe_rtlsdr.py,
airprobe_rtlsdr_capture.py,
airprobe_decode.py,
Airprobe with RTL-SDR input
This program uses cheap RTL-SDR receivers as a source of the signal. It can be started by running from a terminal:
airprobe_rtlsdr.py
The window of the program contains amplitude spectrum of the signal drawn in real-time. The central frequency of the signal can be changed by moving fc slider. The GSM signal has bandwidth of around 200kHz. By looking for constant hills on the spectrum of such width you can find a GSM broadcasting channel. After setting the fc slider to a carrier frequency of a broadcasting channel the program should immediately print content of subsequent messages on the standard output.
If it doesn't happen, set ppm slider into different positions. The slider is responsible for setting devices clock offset correction. If the clock offset is too large the clock offset correction algorithm that is implemented in the program won't work. There is intentionally added upper of allowable clock offset - it was done in order to avoid adaptation of the algorithm to neighbour channels that would inevitably lead to instability. You can use the value set later by passing it as argument of the program:
airprobe_rtlsdr.py -p <correction>
Capturing and saving with RTL-SDR
This program provides capability to save captured data to file. It supports both raw data in cfile format and gr-gsm's burst format, which are pre-processed GSM-bursts instead of raw signal data:
airprobe_rtlsdr_capture.py
We will add more information about capturing using this program later, for more information about the available options you can start the program with the -h flag:
airprobe_rtlsdr_capture.py -h
Airprobe decoding
This program provides capability to decode GSM messages from saved captures, for example recorded with airprobe_rtlsdr_capture.py:
airprobe_decode.py
The program supports both cfile and burst captures, and decoding of BCCH, SDCCH, TCH/F. Supported A5 ciphers for decryption are A5/1, A5/2 and A5/3. airprobe_decode.py is able to decode full-rate voice codecs GSM-FR, GSM-EFR, AMR 12.2, AMR 10.2, AMR 7.95, AMR 7.4, AMR 6.7, AMR 5.9, AMR 5.15, AMR 4.75.
For more information about the available options you can start the program with the -h flag:
airprobe_decode.py -h
A more detailed how to on the usage of airprobe_decode.py can be found in the Decoding How To
Analyzing GSM messages in the Wireshark
The Airprobe (file, rtlsdr) application sends GSM messages in GSMTAP format that was created by Harald Welte to the UDP port number 4729. Wireshark interprets packets coming on this port as GSM data with GSMTAP header and it is able to dissect messages.
On Debian like systems Wireshark can be installed with:
sudo apt-get install wireshark
To start Wireshark straight to analysis of the GSMTAP packets obtained from gr-gsm's airprobe use following command:
sudo wireshark -k -f udp -Y gsmtap -i lo
If you want to avoid the risks caused by running Wireshark with root privileges follow this short howto:
Decoding hopping channels
Decoding hopping channels can be achieved by feeding one input stream per hopping channel into the GSM Receiver block and connecting the CX port to a CX Channel Hopper block. At the current stage of development however, it is computationally expensive to split a wideband capture into multiple streams in real time. Therefore, the gsm_channelize.py app should be used to perform this task as a preprocessing step.
As an example, the following command will channelize my_wideband_capture.cfile, in this case a cfile captured at 925.2 MHz centered (ARFCN 975) and 20 Msps. As a result, 12 files will be generated for ARFCNs 975 - 1023 at 1 Msps each:
gsm_channelize.py -f my_wideband_capture.cfile -c 925.2e6 990 991 992 993 994 995 1019 1020 1021 1022 1023

Modify and tested by GiamMa-based researchers SDR R&D IoT:
https://www.youtube.com/channel/UC7DNWGgOqe_TN8Lp31Im4Wg
https://plus.google.com/112293140990726648897/posts
related items:
https://z4ziggy.wordpress.com/2015/05/17/sniffing-gsm-traffic-with-hackrf/

https://www.ckn.io/blog/2015/11/29/gsm-sniffing-sms-traffic/