<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SDR on System Overlord</title><link>https://systemoverlord.com/tags/sdr.html</link><description>Recent content in SDR on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 14 Sep 2018 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/sdr/index.xml" rel="self" type="application/rss+xml"/><item><title>Course Review: Software Defined Radio with HackRF</title><link>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</link><pubDate>Fri, 14 Sep 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/09/14/course-review-software-defined-radio-with-hackrf.html</guid><description>&lt;p&gt;Over the past two days, I had the opportunity to attend Michael Ossman&amp;rsquo;s course
&amp;ldquo;Software Defined Radio with HackRF&amp;rdquo; at &lt;a href="https://toorcon.org"&gt;Toorcon XX&lt;/a&gt;. This
is a course I&amp;rsquo;ve wanted to take for several years, and I&amp;rsquo;m extremely happy that
I finally had the chance. I wanted to write up a short review for others
considering taking the course.&lt;/p&gt;
&lt;h2 id="course-material"&gt;Course Material&lt;/h2&gt;
&lt;p&gt;The material in the course focuses predominantly on the basics of Software
Defined Radio and Digital Signal Processing. This includes the math necessary
to understand how the DSP handles the signal. The math is presented in a
practical, rather than academic, way. It&amp;rsquo;s not a math class, but a review of
the necessary basics, mostly of complex mathematics and a bit of trigonometry.
(My high school teachers are now vindicated. I did use that math again.)
You don&amp;rsquo;t need the math background coming in, but you do need to be prepared to
think about math during the class. Extracting meaningful information from the
ether is, it turns out, an exercise in mathematics.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 1/18/14</title><link>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</link><pubDate>Sat, 18 Jan 2014 05:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</guid><description>&lt;p&gt;I&amp;rsquo;ve decided to start posting a weekly reading list of interesting security-related articles I&amp;rsquo;ve come across in the past week. They&amp;rsquo;re not guaranteed to be new, but should at least still be relevant.&lt;/p&gt;
&lt;h4 id="using-a-beaglebone-to-bypass-8021x"&gt;Using a BeagleBone to bypass 802.1x&lt;/h4&gt;
&lt;p&gt;Most security practitioners are already aware that NAC doesn&amp;rsquo;t provide meaningful security. While it&amp;rsquo;ll keep some random guy from plugging in to an exposed ethernet port in the lobby (shouldn&amp;rsquo;t that be turned off?), it won&amp;rsquo;t stop a determined attacker. You can just MITM the legitimate device, let it perform the 802.1x handshake, then send packets appearing to be from the legitimate device. To make it easier, &lt;a href="http://shellsherpa.nl/nac-bypass-8021x-or-beagle-in-the-middle"&gt;ShellSherpa has put together a BeagleBone-based device to automatically MITM the NAC connection&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>