Asi rf-signal-analysis

Analyze wireless and radio frequency security in applications, protocols, and hardware. Covers WiFi, Bluetooth/BLE, RFID/NFC, Zigbee, LoRa, cellular, and SDR-based analysis. Use when auditing IoT devices, wireless protocols, access control systems, or any RF-enabled infrastructure.

install
source · Clone the upstream repo
git clone https://github.com/plurigrid/asi
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/rf-signal-analysis" ~/.claude/skills/plurigrid-asi-rf-signal-analysis && rm -rf "$T"
manifest: skills/rf-signal-analysis/SKILL.md
source content

When to Use

  • IoT devices with wireless connectivity (WiFi, BLE, Zigbee, LoRa, cellular)
  • Wireless protocol implementations and custom RF protocols
  • Physical access control systems (RFID badges, NFC readers, garage doors)
  • Bluetooth peripherals (keyboards, locks, medical devices, fitness trackers)
  • WiFi infrastructure (access points, captive portals, enterprise WPA)
  • Cellular and baseband components (modems, SIM provisioning, SMS gateways)
  • Any RF-emitting device or system (sub-GHz remotes, key fobs, TPMS sensors)
  • Embedded firmware that handles wireless communication stacks

Protocol Attack Surface

WiFi (802.11)

VectorDescription
WPA2 PSKPMKID capture, 4-way handshake capture, offline dictionary attack
WPA3/SAEDragonblood side-channel and downgrade attacks
WPA2-EnterpriseEAP identity theft, evil twin with RADIUS impersonation
Captive PortalsMAC spoofing, DNS tunneling, portal bypass
DeauthenticationClient disconnection, DoS, forced reconnection to rogue AP
Evil TwinRogue AP with matching SSID, credential harvesting
KRACKKey reinstallation attacks on 4-way handshake nonce reuse
PMKIDClientless attack against AP, hashcat-crackable

Bluetooth / BLE

VectorDescription
Pairing VulnerabilitiesJust Works passkey bypass, MITM during pairing
GATT EnumerationService/characteristic discovery, read/write unprotected attrs
Relay/Replay AttacksProximity relay (e.g., car unlock), captured GATT writes
KNOB AttackKey negotiation entropy reduction to 1 byte
BIAS AttackImpersonation via role switching during secure connection
BLE SniffingAdvertisement channel capture, connection following
MAC Randomization BypassTracking via advertising data fingerprinting

RFID / NFC

VectorDescription
Badge CloningEM4100/HID 125kHz long-range read and duplicate
Mifare ClassicNested attack, hardnested, darkside key recovery
HID iClassStandard key looper, elite key diversification attacks
DESFireSide-channel key recovery on older implementations
Replay AttacksCaptured credential replay on access controllers
NFC MITMRelay between card and reader (NFCGate)
SkimmingLong-range unauthorized credential reads

Zigbee / Z-Wave

VectorDescription
Default Trust Center KeyWell-known ZigBee HA key (5A 69 67...)
Touchlink CommissioningFactory reset and re-pair to attacker network
Key SniffingOTA key transport capture during join
Z-Wave S0 DowngradeForce insecure inclusion, capture network key
Z-Wave S2DSK interception during inclusion ceremony

LoRa / LoRaWAN

VectorDescription
ABP vs OTAAABP uses static session keys, vulnerable to key reuse
Frame Counter ResetDevice reset replays previously seen frames
Session Key ReuseABP keys persist across sessions, enable decryption
Join-Accept ReplayReplay captured OTAA join responses
Bit-FlippingUnencrypted FPort/FOpts manipulation

Cellular

VectorDescription
IMSI CatchingFake base station, device identity capture (Stingray)
SS7 ExploitationLocation tracking, SMS interception, call redirect
SIM SwapSocial engineering carrier to transfer number
Baseband AttacksRCE via malformed RRC/NAS messages
2G DowngradeForce device to GSM, no mutual authentication
VoLTESIP/RTP interception on LTE voice channels

Sub-GHz (ISM Band)

VectorDescription
Garage DoorsFixed code capture and replay (300-433 MHz)
Car Key FobsRollJam (jam + capture rolling code), relay attack
TPMS SensorsSpoofed tire pressure to trigger warnings (315/433 MHz)
ISM Band JammingBroadband noise on 315/433/868/915 MHz
ASK/OOK ReplaySimple modulation schemes trivially replayed

Tool Reference

SDR Hardware & Software

ToolPurpose
HackRF OneTX/RX 1 MHz–6 GHz, 20 MHz bandwidth
RTL-SDRRX-only dongle, 24–1766 MHz, low cost recon
YARD Stick OneSub-GHz TX/RX (< 1 GHz), ISM band attacks
GNU RadioSignal processing flowgraph framework
Universal Radio HackerProtocol analysis, demod, decoding, fuzzing
SDR++ / GQRXReal-time spectrum visualization

WiFi Tools

ToolPurpose
aircrack-ng suiteMonitor mode, capture, deauth, crack WPA
bettercapMITM framework, WiFi deauth, evil twin
hostapd-manaRogue AP with EAP credential capture
hcxdumptoolPMKID and handshake capture (clientless)
hcxtoolsConvert captures to hashcat/JTR format
wifite2Automated WiFi audit wrapper

Bluetooth Tools

ToolPurpose
Ubertooth OneBLE and classic BT sniffing (2.4 GHz)
btlejackBLE connection hijacking and sniffing
gatttool / bluetoothctlGATT service enumeration and interaction
nRF Connect (app/desktop)BLE scanning, GATT browser, DFU testing
Bettercap BLE moduleBLE enumeration and write injection
CrackLECrack BLE Legacy Pairing (Just Works/passkey)

RFID Tools

ToolPurpose
Proxmark3 (RDV4)Multi-frequency RFID read/write/emulate/sniff
Flipper ZeroSub-GHz, RFID, NFC, IR, iButton swiss army knife
libnfcOpen-source NFC library and utilities
mfoc / mfcukMifare Classic offline/unknown key cracking
ACR122UUSB NFC reader for desktop analysis

Signal Analysis

ToolPurpose
Wireshark802.11, BLE, Zigbee protocol decode
inspectrumSpectrogram analysis and signal measurement
baudlineReal-time FFT signal analysis
SigDiggerQt-based signal analyzer with inspectrum-like features
rtl_433Decode OOK/FSK protocols from ISM band devices

Audit Methodology

Phase 1: RF Reconnaissance

  • Perform broadband spectrum sweep (SDR + GQRX/SDR++)
  • Identify active frequencies, modulations, duty cycles
  • Catalog all wireless interfaces on target devices
  • Map wireless network topology and access points
  • Document regulatory bands in use and transmission power

Phase 2: Protocol Enumeration

  • Identify protocols on discovered frequencies (WiFi, BLE, Zigbee, proprietary)
  • Enumerate advertised services (GATT, SSIDs, PAN IDs, device names)
  • Fingerprint firmware versions and chipset identifiers
  • Map protocol state machines and message sequences
  • Identify supported security modes and negotiation behavior

Phase 3: Authentication Analysis

  • Test pairing and association mechanisms for weaknesses
  • Attempt default/well-known key access (Zigbee HA key, HID iClass standard)
  • Evaluate key derivation and entropy (PRNG seeding, key length negotiation)
  • Test credential storage on device (flash dump, JTAG/SWD extraction)
  • Assess mutual authentication requirements (or lack thereof)

Phase 4: Traffic Analysis

  • Capture and decode protocol traffic (Wireshark, URH, rtl_433)
  • Identify cleartext or weakly encrypted data transmissions
  • Analyze session management (frame counters, sequence numbers, nonces)
  • Look for information leakage in metadata, headers, or advertisements
  • Correlate traffic patterns with device behavior

Phase 5: Injection & Manipulation

  • Replay captured frames and assess acceptance (replay protection)
  • Inject crafted packets to test input validation
  • Attempt protocol downgrade attacks (WPA3→WPA2, S2→S0, BLE SC→Legacy)
  • Fuzz protocol parsers with malformed frames
  • Test jamming resilience and failover behavior

Phase 6: Persistence & Lateral Movement

  • Assess post-compromise persistence on wireless devices (firmware implants)
  • Test pivot from wireless to wired network segments
  • Evaluate OTA update mechanisms for hijacking potential
  • Check for mesh network propagation of compromised keys
  • Document trust relationships between wireless components

Code Review Patterns

When reviewing source code for RF/wireless implementations, flag:

  • Hardcoded Keys: Encryption keys, PINs, or network credentials in source/firmware
  • Weak Randomness: Use of
    rand()
    ,
    millis()
    , or predictable seeds for nonces/keys
  • Missing Replay Protection: No frame counter, sequence number, or timestamp validation
  • Cleartext Transmission: Sensitive data sent without encryption over RF
  • Weak Key Derivation: Short keys, no KDF, or insufficient PBKDF2/scrypt rounds
  • Missing Mutual Authentication: Device trusts any peer without verifying identity
  • No Firmware Signature Verification: OTA updates accepted without code signing
  • Static Session Keys: ABP-style fixed keys that survive device reboot
  • Insufficient Key Rotation: Long-lived symmetric keys without renegotiation
  • Debug Interfaces Left Open: JTAG/SWD/UART enabled in production firmware

Related Skills

  • reverse-engineering
    — Firmware extraction, binary analysis, protocol RE
  • entry-point-analyzer
    — Identify attack entry points across system boundaries
  • iot-device-provisioning
    — Secure device onboarding and credential management