Evil Crow RF V2 Radiofrequency Device For Pen-Testing and Red Team Operations

$88.00

Out of stock

SKU: AE_3256804426632362_1769494d78ce5835 Categories: ,

Description

Evil Crow RF V2 radiofrequency hacking device for pentesting and Red Team operations,

Radiofrequency bands:

· 300Mhz-348Mhz

· 387Mhz-464Mhz

· 779Mhz-928Mhz

· 2.4GHz

Evil Crow RF V2 has two CC1101 radiofrequency modules, these modules can be configured to transmit or receive on different frequencies at the same time. Additionally, Evil Crow RF V2 has a NRF24L01 module for other attacks including:

· Signal receiver

· Signal transmitter

· Replay attack

· URH parse

· Mousejacking

 

Evil Crow RF V2

Disclaimer

Evil Crow RF V2 is a basic device for professionals and cybersecurity enthusiasts.

We are not responsible for the incorrect use of Evil Crow RF V2. The Evil Crow device is recommend using this device for professional testing and learning.

Be careful with this device and the transmission of signals. Make sure to follow the laws that apply to your country.

The Battery and card in the picture are just for showing which are not included in the package.

Introduction

Evil Crow RF V2 is a radiofrequency hacking device for pentest and Red Team operations, this device operates in the following radiofrequency bands:

· 300Mhz-348Mhz

· 387Mhz-464Mhz

· 779Mhz-928Mhz

· 

2.4GHz

· 

Evil Crow RF V2 has two CC1101 radiofrequency modules, these modules can be configured to transmit or receive on different frequencies at the same time. Additionally, Evil Crow RF V2 has a NRF24L01 module for other attacks.

Evil Crow RF V2 allows the following attacks:

· Signal receiver

· Signal transmitter

· Replay attack

· URH parse

· 

Mousejacking

· 

· 

NOTE:

· 

· All devices have been flashed with basic firmware Evil Crow RF V2 before shipping.

· Please do not ask for new functions in this code. You can develop code for Evil Crow RF V2 and send PR with your new code.

For more information please check the Evil Crow RF V2 Github repo:

Firmware

The basic firmware allows to receive and transmit signals. You can configure the two radio modules through a web panel via WiFi.

Installation

1. Install esptool: sudo apt install esptool

2. Install pyserial: sudo pip install pyserial

3. Download and Install the Arduino IDE: https://www.arduino.cc/en/main/software

4. Download Evil Crow RF V2 repository: git clone https://github.com/joelsernamoreno/EvilCrowRF-V2.git

5. Download the ESPAsyncWebServer library in the Arduino library directory: git clone https://github.com/me-no-dev/ESPAsyncWebServer.git

6. Download the AsyncTCP library in the Arduino library directory: git clone https://github.com/me-no-dev/AsyncTCP.git

7. Edit AsyncTCP/src/AsyncTCP.h and change the following:

· #define CONFIG_ASYNC_TCP_USE_WDT 1 to #define CONFIG_ASYNC_TCP_USE_WDT 0

1. Open Arduino IDE

2. Go to File – Preferences. Locate the field “Additional Board Manager URLs:” Add “https://dl.espressif.com/dl/package_esp32_index.json” without quotes. Click “Ok”

3. Select Tools – Board – Boards Manager. Search for “esp32”. Install “esp32 by Espressif system version 1.0.6”. Click “Close”.

4. Open the EvilCrowRF-V2/firmware/v1.0/EvilCrow-RFv2/EvilCrow-RFv2.ino sketch

5. Select Tools:

· Board – “ESP32 Dev Module”.

· Flash Size – “4MB (32Mb)”.

· CPU Frequency – “80MHz (WiFi/BT)”.

· Flash Frequency – “40MHz”

· Flash Mode – “DIO”

6. Upload the code to the Evil Crow RF V2 device

7. Copy the EvilCrowRF-V2/firmware/v1.0/SD/HTML folder to a MicroSD card.

8. Copy the EvilCrowRF-V2/firmware/v1.0/SD/URH folder to a MicroSD card.

First steps with Evil Crow RF V2

1. Insert the MicroSD card into the Evil Crow RF V2 and connect the device to an external battery or laptop.

2. Visualize the wifi networks around you and connect to the Evil Crow RF V2 (default SSID: Evil Crow RF v2).

3. Enter the password for the wifi network (default password: 123456789).

4. Open a browser and access the web panel (default IP: 192.168.4.1).

5. Go!

RX Config Example

· Module: (1 for first CC1101 module, 2 for second CC1101 module)

· Modulation: (example ASK/OOK)

· Frequency: (example 433.92)

· RxBW bandwidth: (example 58)

· Deviation: (example 0)

· Data rate: (example 5)

RX Log Example

RAW TX Config Example

· Module: (1 for first CC1101 module, 2 for second CC1101 module)

· Modulation: (example ASK/OOK)

· Transmissions: (number transmissions)

· Frequency: (example 433.92)

· RAW Data: (raw data or raw data corrected displayed in RX Log)

· Deviation: (example 0)

Binary TX Config Example

· Module: (1 for first CC1101 module, 2 for second CC1101 module)

· Modulation: (example ASK/OOK)

· Transmissions: (number transmissions)

· Frequency: (example 433.92)

· Binary Data: (binary data displayed in RX Log)

· Sample Pulse: (samples/symbol displayed in RX Log)

· Deviation: (example 0)

Pushbuttons Configuration

· Button: (1 for first pushbutton, 2 for second pushbutton)

· Modulation: (example ASK/OOK)

· Transmissions: (number transmissions)

· Frequency: (example 433.92)

· RAW Data: (raw data or raw data corrected displayed in RX Log)

· Deviation: (example 0)URH Parse example

Demo: https://youtube.com/watch?v=TAgtaAnLL6U

Other Sketches

· Mousejacking: EvilCrowRF-V2/firmware/other/standalone-mousejacking

· 

Evil Crow RF V2 Support

· You can ask in the Discord group: https://discord.gg/jECPUtdrnW

· You can open issue or send me a message via twitter (@JoelSernaMoreno).

· For more information please check the Evil Crow RF V2 Github repo: https://github.com/joelsernamoreno/EvilCrowRF-V2

 

Reviews

There are no reviews yet.

Be the first to review “Evil Crow RF V2 Radiofrequency Device For Pen-Testing and Red Team Operations”

Your email address will not be published. Required fields are marked *