Skip to content

The required tools and materials to perform Samy Kamkar's RollJam attack

Notifications You must be signed in to change notification settings

minkione/RollJam-2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 

Repository files navigation

RollJam

This is a Github repository devoted to delivering to you the necessary and required tools and hardware to perform Samy Kamkar's RollJam attack.

This is for educational purposes only. I am in NO WAY liable for any actions executed by means of the contents within this repository. PLEASE use responsibly.

Prerequisites:

Hardware:

• Raspberry Pi (3B+ reccomended)

• YARD Stick One (With ANT500 Telescopic antenna, reccomended)

• SDR Dongle (Only necessary for finding the frequency of target; Without it, you can do a plate lookup and find the fob frequency online)

Software:

• Install Raspbian on your Raspberry Pi

• Install Rpitx on your Raspberry Pi

• Install RfCat on your machine (it should be a portable laptop)

Getting started:

Make sure you have a wire attatched to the GPIO pin of your Raspberry Pi to act as an antenna.

"cd" into your Rpitx folder and run:

sudo ./sendiq -i /dev/stdin -s 96000 -f <frequency> -t float

Set your jamming frequency to be slightly higher or lower than the listening frequency.

Run replay.py (Credit to AndrewMohawk and their RfCatHelpers repository) to listen for the unexpired key:

python replay.py -f <frequency> -n <number of keys to collect>

Once the key(s) are captured, you may stop jamming.

You now have an unexpired key to use on the target!

About

The required tools and materials to perform Samy Kamkar's RollJam attack

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages