Tagged: hackrf

Budget HackRF: A $150 HackRF Clone

Back in December 2014 the HackRF Blue came out via a crowd funded Indiegogo campaign as a HackRF board that was $100 cheaper than the official version ($199 vs $299 USD). The HackRF is a 8-bit receive and transmit capable SDR with operating range of between 0.1 – 6000 MHz and a bandwidth of up to 20 MHz. As its hardware specifications are released as open source, it is very easy for clones of the official version to be produced. While the HackRF Blue Indiegogo campaign was successful, the product is now out of stock as they seemed to stop production after the campaign.

Now a new budget HackRF is in the works and it is aptly called the “Budget HackRF”. This one aims to be even cheaper than the HackRF Blue coming in at a price of only $150 USD. The people behind the project write:

We are a PCB and SMT assembly factory founded in the year 2001, located in Shenzhen, China. We are a professional EMS/OEM company; provide one-stop contract electronic manufacturing service for PCB&PCBA. Now we want to make small market devices and sell directly to customers.

Some of the part on HackRF is End Of Life and very difficult to find now. We have enough of these part for ~300 HackRF only. You can find some HackRF on Alibaba right now, but they used cheap parts and the manufacture does not test them (they do not install any firmware).

We are trying to find some more of the EOL part first and will make the Kickstarter campaign soon. If we can’t find any more of these part, we will only make ~300pcs. Please register first, when we activate the campaign we will tell you by email. The first 10 people who buy from the Kickstarter will have a heavy discount, only pay $75!

Of note, is that the HackRF Blue also intends to make a comeback in April. Their website contains a registration form to register interest.

hackrf_budget

Review: Airspy vs. SDRplay RSP vs. HackRF

asvsrspvshackrf

IMPORTANT NOTE: Please note that this review is now out of date as the SDRplay RSP line has received significant improvements to their hardware and Airspy have brought out a new SDR that is much better at HF.

Overall it is now difficult to pick a winner between Airspy and SDRplay products. However, our preference is the Airspy HF+ Discovery for HF signals, and the SDRplay RSP1A for generic wideband wide frequency range receiving.

When people consider upgrading from the RTL-SDR, there are three mid priced software defined radios that come to most peoples minds: The Airspy (store), the SDRplay RSP (store) and the HackRF (store).  These three are all in the price range of $150 to $300 USD. In this post we will review the Airspy, review the SDRplay RSP and review the HackRF and compare them against each other on various tests.

Note that this is a very long review. If you don't want to read all of this very long post then just scroll down to the conclusions at the end.

What makes a good SDR?

In this review we will only consider RX performance. So first we will review some terminology, features and specifications that are required for a good RX SDR.

SNR - When receiving a signal the main metric we want to measure is the "Signal to Noise" (SNR) ratio. This is the peak signal strength minus the noise floor strength.

Bandwidth - A larger bandwidth means more signals on the screen at once, and more software decimation (better SNR). The downside is that greater CPU power is needed for higher bandwidths.

Alias Free Bandwidth - The bandwidth on SDR displays tends to roll off at the edges, and also display aliased or images of other signals. The alias free bandwidth is the actual usable bandwidth and is usually smaller than the advertised bandwidth.

Sensitivity - More sensitive radios will be able to hear weaker stations easier, and produce high SNR values.

ADC - Analogue to digital converter. The main component in an SDR. It samples an analogue signal and turns it into digital bits. The higher the bit size of the ADC the more accurate it can be when sampling.

Overloading - Overloading occurs when a signal is too strong and saturates the ADC, leaving no space for weak signals to be measured. When overloading occurs you'll see effects like severely reduced sensitivity and signal images.

Dynamic Range - This is directly related to ADC bit size, but is also affected by DSP software processing. Dynamic range is the ability of an SDR to receive weak signals when strong signals are nearby. The need for high dynamic range can be alleviated by using RF filtering. Overloading occurs when a strong signal starts to saturate the ADC because the dynamic range was not high enough.

Images/Aliasing - Bad SDRs are more likely to overload and show images of strong signals at frequencies that they should not be at. This can be fixed with filtering or by using a higher dynamic range/higher bit receiver.

Noise/Interference - Good SDRs should not receive anything without an antenna attached. If they receive signals without an antenna, then interfering signals may be entering directly through the circuit board, making it impossible to filter them out. Good SDRs will also cope well with things like USB interference.

RF Filtering/Preselection - A high performance SDR will have multiple preselector filters that switch in depending on the frequency you are listening to. 

Center DC Spike - A good SDR should have the I/Q parts balanced so that there is no DC spike in the center.

Phase Noise - Phase noise performance is determined by the quality of the crystal oscillators used. Lower phase noise oscillators means better SNR for narrowband signals and less reciprocal mixing. Reciprocal mixing is when high phase noise causes a weak signal to be lost in the phase noise of a nearby strong signal.

Frequency Stability - We should expect the receiver to stay on frequency and not drift when the temperature changes. To achieve this a TCXO or similar stable oscillator should be used.

RF Design - The overall design of the system. For example, how many lossy components such as switches are used in the RF path. As the design complexity increases usually more components are added to the RF path which can reduce RX performance.

Software - The hardware is only half of an SDR. The software the unit is compatible with can make or break an SDRs usefulness.

Next we will introduce each device and its advertised specifications and features:

Device Introduction and Advertised Specifications & Features

  Airspy SDR Play RSP HackRF
Price (USD)

$199 / $ 249 USD (with Spyverter) + shipping ($5-$20).

As of April 2016, the Airspy Mini is now also for sale at $99 USD.

$149 USD + shipping ($20-$30 world, free shipping in the USA)

£99 + VAT + ~£10 shipping for EU.

$299 USD + shipping
Freq. Range (MHz) 24 - 1800
0 - 1800 (with Spyverter addon)
0.1 - 2000 0.1 - 6000
ADC Bits 12 (10.4 ENOB) 12 (10.4 ENOB) 8
Bandwidth (MHz)

10 (9 MHz usable)

6 MHz (5 MHz usable) (AS Mini)

8 (7 MHz usable) (10 MHz in SDRuno/~9 MHz usable) 20
TX No No Yes (half duplex)
Dynamic Range (Claimed)(dB) 80 67 ~48
Clock Precision (PPM) 0.5 PPM low phase noise TCXO 10 PPM XO 30 PPM XO
Frontend Filters Front end tracking IF filter on the R820T2 chip. 8 switched preselection filters + switchable IF filter on MSI001 chip Two very wide preselection filters - 2.3 GHz LPF, 2.7 GHz HPF
ADC, Frontend Chips LPC4370 ARM, R820T2 MSi2500, MSi001 MAX5864, RFFC5071 
Additional Features 4.5v bias tee, external clock input, expansion headers. LNA on the front end 5v bias tee, LNA on front end, external clock input, expansion headers.
Notes

The Airspy is designed by Benjamin Vernoux & Youssef Touil who is also the author of the popular SDR# software. 

Of note is that there has been a misconception going around that the Airspy is an RTL-SDR/RTL2832U device. This is not true; there are no RTL2832U chips in the Airspy. The confusion may come from the fact that they both use the R820T2 tuner. The RTL2832U chip is the main bottleneck in RTL-SDR devices, not the R820T2. When coupled with a better ADC, the R820T2 works well and can be used to its full potential.

The Airspy team write that they sell units mostly to universities, governments and professional RF users. However, they also have a sizable number of amateur users.

Update: As of April 2016 the Airspy Mini is now for sale for $99 USD. The main difference is a 6 MHz bandwidth and fewer expansion headers, but all other specs appear to be the same.

The SDR Play Radio Spectrum Processor (RSP) is designed by UK based engineers who appear to be affiliated with Mirics, a UK based producer of SDR RF microchips.

The chips used in the SDRplay RSP are dedicated SDR chips which were designed for a wide variety of applications such as DVB-T tuners. The RSP uses these chips and improves on their front end capabilities by adding an LNA and filters in order to create a device capable of general SDR use.

Initially when writing this review we had deep problems with the imaging of strong signals on the RSP. However, a recent Dec 22 update to the drivers has fixed this imaging problem tremendously.

The SDRplay is currently selling about 1000 units a month according to electronicsweekly.com.

The HackRF is designed by Micheal Ossmann a computer security researcher who was given a development grant from DARPA. His company is called "Great Scott Gadgets".

The HackRF's most unique feature when compared to the other two SDR's is that it is capable of both receiving and transmitting.

There is also a clone called the HackRF Blue out on the market which is about $100 cheaper, but they don't seem to have stock or be producing these any more.

From the specs it is clear from the ADC sizes that both the Airspy and SDRplay RSP are in a different class of RX performance when compared to the HackRF. However, people always compare the Airspy and SDRplay with the HackRF due to their similar price range, so we will continue to compare the three here in our review, but with more of a focus on comparing the Airspy and SDRplay RSP.

In order to use the Airspy on HF (0 - 30 MHz) frequencies a $50 add on called the Spyverter is required. This is an upconverter that is designed for use with the Airspy's high dynamic range and bias tee power port. However, one hassle is that the Spyverter must be connected/disconnected each time you want to switch between HF and VHF/UHF reception as it does not have VHF/UHF passthrough. The RSP and HackRF on the other hand can receive HF to UHF without the need of an upconverter or the need to change ports. A single port for HF to UHF can be very useful if you have a remote antenna switcher.

Post continues. Note that this is a long post with many images.

Continue reading

Hacking the Z-Wave Protocol with a HackRF

Z-wave is a wireless protocol that is used often in applications like smart home and industrial automation. It essentially allows various wireless nodes to connect and talk to one another within your house, using 900 MHz wireless technology. Some common examples of Z-wave node products might be wireless controlled lights, door locks, thermostats and other security devices like motion detectors.

Recently at Shmoocon 2016 (a yearly hacking and security themed conference), presenters Joseph Hall and Ben Ramsey showed how they were able to use a HackRF software defined radio and some GNU Radio based software to not only sniff Z-wave packets, but to also control Z-wave devices. What’s also interesting is that they found that encryption on z-wave devices was rarely enabled, except for five out of nine door locks that they tested where it was enabled by default.

See the full story at Hackaday and have a look at their code on GitHub.

Joseph and Ben holding a HackRF and z-wave controlled light.
Presenters Joseph and Ben holding a HackRF and z-wave controlled light.

Talk by Micheal Ossmann at Toorcon 2015: Rapid Radio Reversing

Toorcon is a yearly conference that focusus on information security related topics. At the 2015 Toorcon conference Micheal Ossmann (inventor of the HackRF SDR) gave an interesting talk about reverse engineering wireless systems using software defined radio.

Back in November Micheal gave a bit of a quick tutorial on reverse engineering in a November edition of the YouTube web series Hak5. Now his full conference talk has been released over on his website. In his talk he uses a HackRF and a Yardstick One to show how to reverse engineer a wireless cabinet lock.

The video can be viewed below or over on Micheal’s site greatscottgadgets.

Hak5: Reverse Engineering Radio Protocols with SDR and the Yardstick One

Over on YouTube the popular security and hacking themed channel Hak5 have created two videos together with Mike Ossmann (creator of the HackRF and Yardstick One) that give a good introduction and overview on reverse engineering unknown radio protocols. In the video they show how to use a SDR like the RTL-SDR or HackRF to initially capture the radio signal, and then how to use the Yardstick One to reverse engineer and recreate the signal. Using this process they reverse engineer the radio protocol for a wireless liquor cabinet lock.

The Yardstick One is a computer controlled wireless transceiver (but it is not an SDR). The Yardstick One understands many radio protocols by default and can be programmed in Python, lowering the learning barrier for reverse engineering signals.

Mike Ossmann has also been slowly releasing very detailed video tutorials about DSP and radio related topics. If you are interested in reverse engineering radio signals it is a very helpful series to watch.

Radio Hacking: Reverse Engineering Protocols Part 1 - Hak5 1913

Radio Hacking: Reverse Engineering Protocols Part 2 - Hak5 1914

Another L-Band Antenna Build and comparing L-Band reception on the RTL-SDR, HackRF and SDRplay

Over on Reddit user killmore231 has made a post showing his comparison of L-Band reception with RTL-SDR, HackRF and SDRplay software defined radios. killmore231 built the L-band patch antenna which Adam 9A4QV showed how to build on his YouTube channel late last month.

When testing the antenna on his RTL-SDR he saw no reception of any L-band signals at all. The RTL-SDR requires an external LNA to properly receive signals at this frequency range, which he did not have. Next he tried it on his HackRF and saw that some signals were weakly visible. When he tried it on his SDRplay the L-band satellite signals were clearly visible, probably due to the SDRplay’s good sensitivity at this frequency range and the fact that it has a built in LNA. His results show that the SDRplay is a good SDR for receiving L-band satellites as it does not need an external LNA for decent reception. An external LNA may still be needed if a long run of coax cable is used however.

SDRplay reception of L-band satellite signals with no external LNA.
SDRplay reception of L-band satellite signals with no external LNA.
L-band patch antenna
L-band patch antenna

Reverse engineering a public parking electronic display to play Tetris

Recently we received an email from RTL-SDR.com reader @Ivoidwarranties about his latest project which involved using a HackRF to reverse engineer the RF protocol used by a public parking electronic display. Once reverse engineered @Ivoidwarranties used a XR-2206 monolithic function generator, hybrid RF amplifier and an Arduino to create a device that overrides the public parking display and plays a game of Tetris on it.

We don’t have any details on the HackRF reverse engineering side of things, but he has uploaded a video to YouTube showing the hack in action.

Real hacking of public parking electronic display

Spoofing GPS Locations with low cost TX SDRs

At this years Defcon 2015 conference researcher Lin Huang from Qihoo 360 presented her work on spoofing GPS signals. Qihoo 360 is a Chinese security company producing antivirus software. Lin works at Qihoo as a security researcher where her main job is to prevent their antivirus software and users from becoming vulnerable to wireless attacks. Her research brought her to the realm of GPS spoofing, where she discovered how easy it was to use relatively low cost SDRs like a USRP B210/BladeRF/HackRF to emulate GPS signals which could allow a wireless attacker to manipulate the GPS on smartphones and cars.

Previous attempts at GPS spoofing have all used more expensive custom hardware. One attempt in 2013 allowed university researchers to send a 213-foot yacht off course, and it is suspected that hackers from the Iranian government have used GPS spoofing to divert and land an American stealth drone back in 2011.

In Lin’s presentation she shows how she was able to trick a smartphone into thinking it was in a different location. In addition she writes how this method could be used to trick the phone into changing it’s time, as many smartphones will periodically refresh the clock accuracy by using GPS satellites. She also shows how she was able to bypass a DJI drones forbidden area no fly zone policy. DJI drones come with a feature where the engines will not power up if the on board GPS detects that it is in a no drone fly zone. By spoofing the GPS she was able to get the drone to power up inside a no fly zone in Beijng.

Lin Huangs presentation can be downloaded from the defcon media server (pdf). An article on Lin and her research into GPS spoofing has also been run on Forbes.com.

Spoofed GPS logs on a smartphone
Spoofed GPS logs on a smartphone