2021年7月

HackRF-Portapack Files for the DeBruijn attack!

This is a Github repository devoted to delivering to you the required files to perform the DeBruijn attack from your HackRF-Portapack

This is for educational purposes only. I am in NO WAY liable for any actions executed by means of the contents within this repository. PLEASE use responsibly.

If unfamiliar with the debruijn attack: this attack transmits a single signal that contains every possible combination of a specific bit-length in just seconds by overlapping binary sequences

The files I am sharing only go from 8 to 12 bits which should suffice in any and all situations that apply

A list of devices that are vulnerable to this attack consists of but is not limited to:

• Garage doors • Automatic gates • Cars

This attack will NOT work on devices that utilize rolling codes

Prerequisites:
Hardware:
• HackRF and Portapack

Getting started:
Transfer these files to a folder called "DeBruijn" at the root of your Portapack's SD card.

To perform the attack(s), simply use the "Replay" function within the "Havoc" or "Mayhem" firmware and choose one of these files in the "DeBruijn" folder

These files are labeled according to what type of key/remote they are calculated for based on bit-length

Have fun, and USE RESPONSIBLY

If you'd like to use trinary sequences as well, click here for the full version

OSTAR on bcm2708/zero/zero w/raspberry pi 2b

OSTAR is Opensource so i make a rpi zero/zero w image for test

the image is just 15Mb when comparess,tf card is 500Mb enought
support usb wifi rtl8812eus and zero w wifi for AP mode
usb wifi in Client Mode is not work
OSTAR on rpi is just for LTE EC20/SIM7600 pcie card WAN connection.

ostar running is not stable,DMR not work ,only test YSF function.

if you have zero /zero w and usb LTE module, Running YSF mode you can try it.

if you can't see the Menu,open http://192.168.10.1/cgi-bin/luci/admin/system
use another Therm. and save you can see the Menu

openwrt-brcm2708-bcm2708-rpi-ext4-factory.rar