Unleashing Your SDR: Join us on the Radio Spectrum
An Update on our Latest Series on Software Defined Radio
In our multi part series SDR & Radio Hacking, we’ve explored the usage of the radio frequency spectrum in signals intelligence and non traditional cyber security roles. What has started as a short multi part series has sparked off some interest so we’ve decided to change course slightly.
This course change means we’ve launched a new Medium Publication called Radio Hackers. We’d like to centralize our articles around this topic in one easy place to keep them accessible for easy reference as well as stimulate discussion around exploring and securing vulnerabilities within RF based infrastructure.
We’ve also extended the number of articles we intend to launch. This allows us to be able to explore additional topics, like Drone Down links & Bluetooth protocols as well as infrastructure like Satellite’s, NFC and various angles around playing with GPS.
Some of the other things we’ll explore include:
- Amateur Radio (Ham Radio): Discover how Radio Hackers use SDR to join the global community of amateur radio enthusiasts, pushing the boundaries of communication and technology.
- IoT Devices: Uncover the vulnerabilities in Internet of Things (IoT) devices and how SDR can be used to secure or exploit them, highlighting the need for robust cybersecurity in our increasingly interconnected world.
- Wireless Protocols: Learn about the wide array of wireless protocols and standards that Radio Hackers & Red Teamers encounter, from Wi-Fi and Bluetooth to Zigbee and RFID, and how SDR empowers them to understand and manipulate these technologies.
- Signal Identification: Learn how to identify and decode received signals both visually and audibly.
- Hardware Manipulation: Explore how we can use radio protocols to engage with real world hardware, including NFC cards and Smart Devices
Join the Community:
Are you a Radio Hacker? A Listener? Maybe a Hardware Modifier?
Do you have experiences, insights, or stories to share related to SDR, signals interception, or non-traditional cyber security roles? We invite you to contribute your own articles to our Medium publication, “Radio Hackers.” Share your knowledge, challenges, and successes, and be part of a growing community that explores the fascinating intersection of technology, communication, and cyber security.
And if you aren't a medium member then stress not! We'll continue cross posting content to both bulb and publish0x as well as putting all the latest articles on our telegram.
🌟 Enjoyed this article? Support our work and join the community! 🌟
💙 Support me on Ko-fi: Investigator515
📢 Join our Telegram channel for exclusive updates or.
🐦 Follow us on Twitter
🔗 Articles we think you’ll like:
- OSINT Unleashed: 5 Essential Tools for Cyber Investigators
- What the Tech?! GPS Technology
✉️ Want more content like this? Sign up for email updates here