Tuesday, May 8, 2018

Ok, gentlemen, this is the board of Sentinel (similar) . what we can see here, is that agile gateway where the key exchange crypto is, is then connected to re transmission radios, at least 4. was trying to find a sniffer, but its very hard, no wireshark suits this. So, you have 4 waveforms for sniffing, until you find the frame which is the key between the ground base and the drone. Nevertheless, this also relies on the email protocol they are using for exchanging messages with keys.

Mostrar mais reações

and the solution is ..."every TC2 needs to duplicate the code 6 times"

Connecting to Broadlink device.... Connected.... Traceback (most recent call last): File "sendCode.py", line 21, in device.send_data(codeData.decode('hex')) File "D:\Python27\lib\site-packages\broadlink-0.3-py2.7.egg\broadlink\__init__.py", line 455, in send_data self.send_packet(0x6a, packet) File "D:\Python27\lib\site-packages\broadlink-0.3-py2.7.egg\broadlink\__init__.py", line 250, in send_packet response = self.cs.recvfrom(1024) socket.timeout: timed out

@masterkenobi Awesome, I think that is something related to the broadlink python library.
Now take this working code length convet it to base 64 and send it using HA.

Welcome back to war! Gentlemen, again spoofing..when you read this code, you will find out that the error remains on the install packet of python broadcast .egg since the lengh is not correct (neither I wanted this hex, for our purpose) ..so after reading and fork the code, I'll post the solution ...


Hi NightRang3r, thanks for putting together a great tool. I'm not a coder and I'm making this happen base on your instructions. I got as far as dumping the code using…
GITHUB.COM

Monday, May 7, 2018

.back to warfare ! what's the "unexpected " the tread? rebroadcast with u-blox NEO!

Generate a GPS signal and send it with HACKRF One, to deceive GPS receivers

at eBay, you build your own mounted millimeter microwave radar to disrupt UAV's (not only 8 miles range, commercial drones...) with magnetron radars 

First the photo, of what they call being the Bligther ...ok, they think they are very smart ...so as you see it has at least 6 magnetron radars bidirectional and a common RF scanner detector, and its mounted at a "strategic" middle eat air base

you were laughing...I see...but I was warming up
CT-4002P Portable Anti Drone 32W 2.4Ghz GPS 5.8Ghz Directional Jammer up to 700m
Portable directional handheld drone (UAV) jammer that is designed to be compact for easy carrying and military terrain use. It is fully autonomy with built in antennas and battery for 80 min operation. It is best suited for military special operations teams, police, security forces that are deployed in different situations
Specialized to block 2.4Ghz, GPS, and 5.8Ghz signals that use most of commercial UAV Drones for their remote controls.. The effective blocking range is 300 to 700 meters. The jamming distance always varied depending on the signal strength and location  Do not blocking GSM Cell phones.

Portable Anti-Drone Jammer
Max 32W, 4 Bands, 2.4Ghz GPS L1 5.8Ghz
80 mins Built-in Battery, Battery LED Status
Four Bands in One Directional Antenna    2.4-2.5GHz:10W WiFi 11.g, b, Bluetooth (Vertical Polarization)
2.4-2.5GHz:10W WiFi 11.g, b, Bluetooth ( Vertical Polarization)
GPS L1 + GLONASS L1 :10W 1570-1620MHz
5.7GHz-5.9GHz: 2.0W WiFi 11.a
Total : 32 W
Jamming  Range radius 300~700 Meters  
Battery Operating Time 80 Minutes, Battery LED Status
Two 2.4GHz Bands 10W per band cover Most Commercial Drones / UAVs
Like Dji Phantom 4, Phantom 3 Professional, Advanced, Standard series, Inspire Series...
Adjustable Output Power each
Max Output Power to 0 (OFF)
100% Safe VSWR over protection (Isolator) for each modular
Power supply: AC Charger adapter (AC220V/110V)
Dimension:240 x 210 x 260 mm (H × W × D)
Weight:3.6 Kg (approximately)
Operating temperature: -20℃ ~ +60℃
Four Bands in One Directional Antenna Specification
 Electrical   Specifications
Frequency Range 1575-1620MHz    2400-2500MHz 2400-2500MHz    5150-5875MHz
Gain    9dBi    13dBi 13dBi 16dBi
VSWR    ≤1.5    ≤1.5    ≤1.5    ≤1.5
Polarization    Vertical    Vertical    Vertical    Vertical
Horizontal beamwidth    95°    65°    65°    25°
Vertical beamwidth    65°    50°    50°    28°
Front to back ratio    ≥24dB    ≥25dB    ≥25dB    ≥25dB
Input Impedance    50Ω    50Ω    50Ω    50Ω
Max Input Power 50W50W50W 50W           
Double 2.4GHz 10W block much longer
Good Isolation each other (4 bands in)
Connector     N-M
Lightning protection    Direct Ground
Mechanical  Specifications
Dimensions    210*94*34mm
Weight    0.8 kg each
Radiator Material    Alumina
Radome Material    Black




Sunday, May 6, 2018

so, gentlemen..you want to make sure, no CIA is listening...make sure, you have the right phone...and the right App

SnoopSnitch Compatibility

SnoopSnitch runs on many Android devices with Qualcomm chipset.
Root privileges are essential: To access radio data, root privileges are strictly required. SnoopSnitch WILL NOT WORK on devices that are not rooted, even if a Qualcomm chipset is present, the Android version is sufficient or the device is mentioned in the list below. You have to root the device yourself - SnoopSnitch will not do that for you. If you do not know what rooting is or how to root your device, have a look here: http://www.xda-developers.com/root/

Supported Devices

The following devices are known to work with SnoopSnitch. It is very likely that other Qualcomm-based Android phones also work, if they are rooted and have a stock firmware or a suitable custom ROM. If your device is working with SnoopSnitch and missing from this list or something is inaccurate, please mail us the exact phone model and Android version


you want fuck them? a 12 million a day, black operations? go shopping...