Tuesday, May 8, 2018

Ok, gentlemen, this is the board of Sentinel (similar) . what we can see here, is that agile gateway where the key exchange crypto is, is then connected to re transmission radios, at least 4. was trying to find a sniffer, but its very hard, no wireshark suits this. So, you have 4 waveforms for sniffing, until you find the frame which is the key between the ground base and the drone. Nevertheless, this also relies on the email protocol they are using for exchanging messages with keys.

Mostrar mais reações

and the solution is ..."every TC2 needs to duplicate the code 6 times"

Connecting to Broadlink device.... Connected.... Traceback (most recent call last): File "sendCode.py", line 21, in device.send_data(codeData.decode('hex')) File "D:\Python27\lib\site-packages\broadlink-0.3-py2.7.egg\broadlink\__init__.py", line 455, in send_data self.send_packet(0x6a, packet) File "D:\Python27\lib\site-packages\broadlink-0.3-py2.7.egg\broadlink\__init__.py", line 250, in send_packet response = self.cs.recvfrom(1024) socket.timeout: timed out

@masterkenobi Awesome, I think that is something related to the broadlink python library.
Now take this working code length convet it to base 64 and send it using HA.

Welcome back to war! Gentlemen, again spoofing..when you read this code, you will find out that the error remains on the install packet of python broadcast .egg since the lengh is not correct (neither I wanted this hex, for our purpose) ..so after reading and fork the code, I'll post the solution ...


Hi NightRang3r, thanks for putting together a great tool. I'm not a coder and I'm making this happen base on your instructions. I got as far as dumping the code using…
GITHUB.COM

Cielo e terra (duet with Dante Thomas)