top of page

Software Defined Radio
for Hackers

sdr.jpg

This new, innovative course from Hackers-Arise exemplifies the cutting edge courses available only at Hackers-Arise. Radio signals swirl around us everywhere whether we are at home, at work, in our car, and nearly everywhere

​​

These radio signals control such devices as;

1. cellphones

2. walkie-talkies

3. Bluetooth devices,

4. garage door openers,

5. flight information signals,

6. car door opener,

7. mobile payment systems (NFC),

8.  RFID signals,

9. GPS,

10. Satellites

11. Drones

12.Police and Military Radio

and so much more.

​

In recent years, developments in Software Defined Radio have made it possible to transform your laptop to send and receive any of these signals. This opens the opportunity for significant cyber security and national defense issues.

​

In this course, we will build a software-defined radio on our standard Linux computer system and then use it to send and manipulate radio signals.

​

To get the most from this course, students should purchase the inexpensive SDR-RTL kit (about $35 on Amazon) and the Hackrf (about $350). The free, open-source software we will download and install in class. This should be fun and mind-bending class as we set up a transceiver for a wide-range of radio signals.

​

This is a Subscriber PRO course.

​

​

SDR for Hackers Tutorials

​

Why You Should Study SDR for Hackers

​

SDR for Hackers: Hardware Comparison for SDR

​

SDR for Hackers, Part 1: Getting Started

​

SDR for Hackers, Part 2: Building our First Radio

​

SDR for Hackers, Part 3: Intercepting Control Tower and  Aircraft Communication

​

SDR for Hackers, Part 4: Intercepting ISS Signals

​

SDR for Hackers, Part 6: Building a Cellphone IMSI Catcher

​

SDR for Hackers: Setting up Your HackRF One

​

SDR for Hackers: Radio Frequency Attack Methods

​

SDR for Hackers: Spoofing GPS Signals

​

SDR for Hackers: Intercepting Aircraft Speed, Altitude, and GPS Coordinates

​

SDR for Hackers: Jamming Russian Military Communication

​

In addition, in the upcoming class we will demonstrate how to set up your own celltower, hack automobile key fobs,  and intercept and use active and inactive satellite communications.

​

​

​

​

bottom of page