Hello Factoria Labs readers! As you may know, Black Hat USA happened earlier this month in Las Vegas. As well as teaching an in-person SDR class, I was also honored to present a hands-on project at the Arsenal Labs – we had a great turnout, as you can see from the picture.
My project was an end-to-end, RF reversal of a simple garage door protocol. Although the signal produced by the garage door remote was not terribly complicated, the project provided a full view of the reversing process, including:
- scanning for the remote’s signal
- capturing the signal to disk
- tuning and demodulating to produce a digital baseband waveform
- identifying the framing and encoding of the baseband waveform and then extracting the bits
- building a simple transmitter to implement the reversed protocol
- building a more complex transmitter to implement brute force attacks
If you caught my presentation and wanted to look at starter and solution projects, it’s all at:
I’ve also included a PDF of the printed handout we had for Arsenal attendees.
If you’re curious, the garage door remote used in the lab was this model:
Thanks for reading!
2 thoughts on “Arsenal Labs at Black Hat 2022”
Empty, this model …
But the rest is good 😉
Weird. Not sure why the preview didn’t work, but it’s fixed now. Thanks for letting me know.