Categories

Reverse engineering a Verisure wireless alarm

Posted on Tuesday, December 9th, 2014 in reversed, RF, SDR, security, sensors, wireless by the machinegeek

foip
Here’s an informative two-part series of posts over at FunOverIP detailing how to reverse engineer a Verisure wireless alarm.

Part 1 details the beginning steps such as finding the modules radio frequency and modulation type, analyzing the chipset datasheet and using GNU Radio. Part 2 covers more complex topics including firmware extraction from an alarm module and analysis of crypto keys.

Good coverage of an interesting use of SDR and related tools.

This entry was posted on Tuesday, December 9th, 2014 at 12:01 am and is filed under reversed, RF, SDR, security, sensors, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Reverse engineering a Verisure wireless alarm”

  1. ben says:

    I’d love to get into SDR, but all the different hardware and software makes it a bit difficult to get started on..

    Anyone know what the difference between the HackRF, AIRSPY , PortableSDR(PSDR), RTL2832U dongles (R820T/E4000), Myriad RF / Novena, etc?

    Do they all support the same software (SDR#) or are there different software choices based on the hardware platform?

    I’d like to capture my rf remote light switch and mimic the signal using a modified beagle bone! I still have a lot to learn*, as I’m wondering what else is possible with an sdr dongle… listening to am/fm radio?

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Crawford: Dibs!
  • Thor: Hello from wet and windy Iceland
  • Peter: Aloha from Hawaii
  • Kurt: A problem is a chance for you to do your best.
  • Dario: Hi, I have a doubt: is it possible configure the FTDI using a I2C and an SPI channels together in the same time? BR Dario