top of page

Software Defined Radio
for Hackers

sdr.jpg

This new, innovative course from Hackers-Arise exemplifies the cutting edge courses available only at Hackers-Arise. Radio signals swirl around us everywhere whether we are at home, at work, in our car, and nearly everywhere

These radio signals control such devices as;

1. cellphones

2. walkie-talkies

3. Bluetooth devices,

4. garage door openers,

5. flight information signals,

6. car door opener,

7. mobile payment systems (NFC),

8.  RFID signals,

9. GPS,

10. Satellites

11. Drones

12.Police and Military Radio

and so much more.

In recent years, developments in Software Defined Radio have made it possible to transform your laptop to send and receive any of these signals. This opens the opportunity for significant cyber security and national defense issues.

In this course, we will build a software-defined radio on our standard Linux computer system and then use it to send and manipulate radio signals.

To get the most from this course, students should purchase the inexpensive SDR-RTL kit (about $35 on Amazon) and the Hackrf (about $350). The free, open-source software we will download and install in class. This should be fun and mind-bending class as we set up a transceiver for a wide-range of radio signals.

This is a Subscriber PRO course.

SDR for Hackers Tutorials

Why You Should Study SDR for Hackers

SDR for Hackers: Hardware Comparison for SDR

SDR for Hackers, Part 1: Getting Started

SDR for Hackers, Part 2: Building our First Radio

SDR for Hackers, Part 3: Intercepting Control Tower and  Aircraft Communication

SDR for Hackers, Part 4: Intercepting ISS Signals

SDR for Hackers, Part 6: Building a Cellphone IMSI Catcher

SDR for Hackers: Setting up Your HackRF One

SDR for Hackers: Radio Frequency Attack Methods

SDR for Hackers: Spoofing GPS Signals

SDR for Hackers: Intercepting Aircraft Speed, Altitude, and GPS Coordinates

SDR for Hackers: Jamming Russian Military Communication

In addition, in the upcoming class we will demonstrate how to set up your own celltower, hack automobile key fobs,  and intercept and use active and inactive satellite communications.

bottom of page