fquinto / EvilCrowRF-V2

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

EvilCrowRF-V2

EvilCrow

Idea, development and implementation: Joel Serna (@JoelSernaMoreno).

Main collaborator: Little Satan (https://github.com/LSatan/)

Other collaborators: Eduardo Blázquez (@_eblazquez), Federico Maggi (@phretor), Andrea Guglielmini (@Guglio95) and RFQuack (@rfquack).

PCB design: Ignacio Díaz Álvarez (@Nacon_96), Forensic Security (@ForensicSec) and April Brother (@aprbrother).

Manufacturer and distributor: April Brother (@aprbrother).

Distributor from United Kingdom: KSEC Worldwide (@KSEC_KC).

The developers and collaborators of this project do not earn money with this. You can invite me for a coffee to further develop Low-Cost hacking devices. If you don't invite me for a coffee, nothing happens, I will continue developing devices.

ko-fi

For sale with April Brother (shipping from China):

For sale with KSEC Worldwide (shipping from United Kingdom):

Discord Group: https://discord.gg/jECPUtdrnW

Summary:

  1. Disclaimer
  2. Introduction
  3. Firmware
    • Installation
    • First steps with Evil Crow RF V2
    • RX Config Example
    • RX Log Example
    • RAW TX Config Example
    • Binary TX Config Example
    • Pushbuttons Configuration
    • Tesla Charge Door Opener
    • URH Parse example
    • OTA Update
    • Wi-Fi Config
    • Power management
    • Other Sketches
  4. Evil Crow RF V2 Support

Disclaimer

Evil Crow RF V2 is a basic device for professionals and cybersecurity enthusiasts.

We are not responsible for the incorrect use of Evil Crow RF V2.

We recommend using this device for testing, learning and fun :D

Be careful with this device and the transmission of signals. Make sure to follow the laws that apply to your country.

EvilCrowRF

Introduction

Evil Crow RF V2 is a radiofrequency hacking device for pentest and Red Team operations, this device operates in the following radiofrequency bands:

  • 300Mhz-348Mhz
  • 387Mhz-464Mhz
  • 779Mhz-928Mhz
  • 2.4GHz

Evil Crow RF V2 has two CC1101 radiofrequency modules, these modules can be configured to transmit or receive on different frequencies at the same time. Additionally, Evil Crow RF V2 has a NRF24L01 module for other attacks.

Evil Crow RF V2 allows the following attacks:

  • Signal receiver
  • Signal transmitter
  • Replay attack
  • URH parse
  • Mousejacking
  • ...

NOTE:

  • All devices have been flashed with basic firmware Evil Crow RF V2 before shipping.
  • Please do not ask me to implement new functions in this code. You can develop code for Evil Crow RF V2 and send PR with your new code.

Firmware

The basic firmware allows to receive and transmit signals. You can configure the two radio modules through a web panel via WiFi.

Installation

  1. Install esptool: sudo apt install esptool
  2. Install pyserial: sudo pip install pyserial
  3. Download and Install the Arduino IDE: https://www.arduino.cc/en/main/software
  4. Download Evil Crow RF V2 repository: git clone https://github.com/joelsernamoreno/EvilCrowRF-V2.git
  5. Download the ESPAsyncWebServer library in the Arduino library directory: git clone https://github.com/me-no-dev/ESPAsyncWebServer.git NOTE: Arduino library directory in GNU/Linux (default) are: ~/Arduino/libraries
  6. Download the AsyncElegantOTA library in the Arduino library directory: git clone https://github.com/ayushsharma82/AsyncElegantOTA.git
  7. Download the ESP32-targz library in the Arduino library directory: git clone https://github.com/tobozo/ESP32-targz.git
  8. Download the AsyncTCP library in the Arduino library directory: git clone https://github.com/me-no-dev/AsyncTCP.git
  9. Edit AsyncTCP/src/AsyncTCP.h and change the following:
  • #define CONFIG_ASYNC_TCP_USE_WDT 1 to #define CONFIG_ASYNC_TCP_USE_WDT 0
  1. Open Arduino IDE
  2. Go to menu "File" > "Preferences..." > Locate the field "Additional board manager URLs:" Add https://dl.espressif.com/dl/package_esp32_index.json > Click "Ok"
  3. Go to menu "Tools" > "Board" > "Boards Manager..." Search for esp32. Install "esp32 by Espressif system version 1.0.6". Click "Close".
  4. Open the EvilCrowRF-V2/firmware/v1.3.2/EvilCrow-RFv2/EvilCrow-RFv2.ino sketch
  5. Go to menu "Tools":
    • "Board" - esp32" > "ESP32 Dev Module".
    • Flash Size - "4MB (32Mb)".
    • CPU Frequency - "80MHz (WiFi/BT)".
    • Flash Frequency - "40MHz"
    • Flash Mode - "DIO"
  6. Go to menu "Tools" > "Port" > "/dev/ttyUSB0"
  7. Upload the code to the Evil Crow RF V2 device: Go to menu "Sketch" > "Upload"
  8. Copy the EvilCrowRF-V2/firmware/v1.3.2/SD/HTML folder to a MicroSD card.
  9. Copy the EvilCrowRF-V2/firmware/v1.3.2/SD/URH folder to a MicroSD card.

SD

Notes about SD:

  • Web server will not load, is a blank page or displays nothing:

Check you have copied the relevant files to the SD card and the SD card is inserted in the Evil Crow RF V2 device. Check you are connected to the Wifi Access Point of the Evil Crow RF V2.

  • My files are on the SD card but the web server will not work:

Check your SD card size. It is recommended to use a small card. 32GB or smaller is sufficent for operation. Cards larger than this have been shown to cause issues and not work.

  • I cannot access the internet when I am connected to the Evil Crow RF V2:

By default, the Evil Crow operates as an access point. When you connect to it, it has no internet access as it is not connected to the internet. If you need internet at the same time, read the Wi-Fi Config section of this repository to configure Evil Crow RF V2 in STATION mode.

First steps with Evil Crow RF V2

  1. Check & verify you have copied the relevant files to your SD card.
  2. Insert the MicroSD card into the Evil Crow RF V2 and connect the device to an external battery or laptop.
  3. Visualize the wifi networks around you and connect to the Evil Crow RF V2 (default SSID: Evil Crow RF v2).
  4. Enter the password for the wifi network (default password: 123456789).
  5. Open a browser and access the web panel (default IP: 192.168.4.1).
  6. Go!

Webpanel

RX Config Example

  • Module: (1 for first CC1101 module, 2 for second CC1101 module)
  • Modulation: (example ASK/OOK)
  • Frequency: (example 433.92)
  • RxBW bandwidth: (example 58)
  • Deviation: (example 0)
  • Data rate: (example 5)

RX

2-FSK NOTES:

  • Evil Crow RF V2 allows 2-FSK (RX/TX) modulation, this is configured for use with CC1101 module 2. Do not use CC1101 module 1 for 2-FSK RX.

  • You can use 2-FSK TX with module 1 or with module 2.

  • Evil Crow RF V2 allows you to receive signals at the same time on two different frequencies, but this does not work correctly if you use 2-FSK. Make sure you use module 2 for 2-FSK RX, while doing this do not use module 1 for anything or you will not receive the 2-FSK signals correctly.

  • You can receive two signals on different frequencies with ASK/OOK.

RX Log Example

RXLog

RAW TX Config Example

  • Module: (1 for first CC1101 module, 2 for second CC1101 module)
  • Modulation: (example ASK/OOK)
  • Transmissions: (number transmissions)
  • Frequency: (example 433.92)
  • RAW Data: (raw data or raw data corrected displayed in RX Log)
  • Deviation: (example 0)

TXRAW

Binary TX Config Example

  • Module: (1 for first CC1101 module, 2 for second CC1101 module)
  • Modulation: (example ASK/OOK)
  • Transmissions: (number transmissions)
  • Frequency: (example 433.92)
  • Binary Data: (binary data displayed in RX Log)
  • Sample Pulse: (samples/symbol displayed in RX Log)
  • Deviation: (example 0)

TXBINARY

Pushbuttons Configuration

  • Button: (1 for first pushbutton, 2 for second pushbutton)
  • Modulation: (example ASK/OOK)
  • Transmissions: (number transmissions)
  • Frequency: (example 433.92)
  • RAW Data: (raw data or raw data corrected displayed in RX Log)
  • Deviation: (example 0)

TXBUTTON

Tesla Charge Door Opener

Demo: https://www.youtube.com/watch?v=feNokjfEGgs

URH Parse example

Demo: https://youtube.com/watch?v=TAgtaAnLL6U

OTA Update

Demo: https://www.youtube.com/watch?v=YQFNLyHu42A

WiFi Config

Evil Crow RF V2 is configured in AP mode with a default SSID and password. You can change the mode to STATION or AP, change SSID, change password and change Wi-Fi channel remotely from the web panel.

The changes will be stored in the device, every time you restart Evil Crow RF V2 the new Wi-Fi settings will be applied. If you want to return to the default settings, you can delete the stored Wi-Fi configuration from the web panel.

NOTE: When changing the Wi-Fi configuration you have to fill in all the fields correctly, if you do not do this you bricked the device.

Power Management

  1. In normal mode, press push2 + reset, then release reset: Evil Crow RF v2 blinks several times and goes to sleep.
  2. In sleep mode, press push2 + reset, then release reset to wake him up.

Demo: https://www.youtube.com/shorts/K_Qkss6-pEY

NOTE: If Evil Crow RF v2 is sleeping and you accidentally press reset, he'll go straight back to sleep. If he isn't asleep and you press reset then he will stay awake too.

Other Sketches

  • Mousejacking: EvilCrowRF-V2/firmware/other/standalone-mousejacking
  • ...

Evil Crow RF V2 Support

About

License:Creative Commons Attribution 4.0 International


Languages

Language:C++ 69.5%Language:HTML 20.4%Language:Python 5.4%Language:CSS 4.2%Language:JavaScript 0.4%Language:C 0.1%