|
|
3 лет назад | |
|---|---|---|
| binaries | 3 лет назад | |
| images | 3 лет назад | |
| protocols | 3 лет назад | |
| LICENSE | 3 лет назад | |
| README.md | 3 лет назад | |
| app.c | 3 лет назад | |
| app.h | 3 лет назад | |
| app_buffer.c | 3 лет назад | |
| app_buffer.h | 3 лет назад | |
| app_subghz.c | 3 лет назад | |
| appicon.png | 3 лет назад | |
| application.fam | 3 лет назад | |
| crc.c | 3 лет назад | |
| custom_presets.h | 3 лет назад | |
| data_feed.c | 3 лет назад | |
| fields.c | 3 лет назад | |
| signal.c | 3 лет назад | |
| signal_file.c | 3 лет назад | |
| ui.c | 3 лет назад | |
| view_build.c | 3 лет назад | |
| view_direct_sampling.c | 3 лет назад | |
| view_info.c | 3 лет назад | |
| view_raw_signal.c | 3 лет назад | |
| view_settings.c | 3 лет назад |
ProtoView is a digital signal detection, visualization and reply tool for the Flipper Zero. The Flipper is able to identify a great deal of RF protocols, however when the exact protocol is not implemented (and there are many proprietary ones, such as the ones in use in TPMS systems, car keys and many others), the curious person is left wondering what the device is sending at all. Using ProtoView she or he can visualize the high and low pulses like in the example image below (showing a TPMS signal produced by a Renault tire):
This is often enough to make an initial idea about the encoding used and if the selected modulation is correct. For example, in the signal above you can see a set of regular pulses used for synchronization and then a sequence of bits encoded in Manchester line code. If you study these things for five minutes, you'll find yourself able to decode the bits with naked eyes.
Other than that, ProtoView is able to decode a few interesting protocols:
The app implements a framework that makes adding and experimenting with new
protocols very simple. Check the protocols directory to see how the
API works. The decoder receives the signal already converted into a bitmap,
where each bit represents a short pulse duration. Then there are functions
to seek specific sync/preamble sequences inside the bitmap, to decode
from different line codes, to compute checksums and so forth.
Once ProtoView decodes a given message, it is able to resample it in pulses and gaps of the theoretical duration, and send the signal again via the Flipper TX capabilities. The captured signal can be sent to different frequencies and modulations than the ones it was captured from.
The secondary goal of ProtoView is to provide a somewhat-documented application for the Flipper (even if ProtoView is a pretty atypical application: doesn't make use of the standard widgets and other abstractions provded by the framework). Many apps dealing with the subghz subsystem (the Flipper abstraction to work with the CC1101 chip) tend to be complicated and completely undocumented. This is unfortunately true for the firmware of the device itself. It's a shame because especially in the case of code that talks with hardware peripherals there are tons of assumptions and hard-gained lessons that can only be captured by comments and are in the code only implicitly.
However, the Flipper firmware source code is well written even if it lacks comments and documentation, so it is possible to make some ideas of how things work just grepping inside.
In order to show unknown signals, the application attempts to understand if the samples obtained by the Flipper API (a series of pulses that are high or low, and with different duration in microseconds) look like belonging to a legitimate signal, and aren't just noise.
We can't make assumptions about the encoding and the data rate of the communication, so we use a simple but relatively effective algorithm. As we check the signal, we try to detect long parts of it that are composed of pulses roughly classifiable into a maximum of three different classes of lengths, plus or minus 10%. Most encodings are somewhat self-clocked, so they tend to have just two or three classes of pulse lengths.
However often pulses of the same theoretical length have slightly different lengths in the case of high and low level (RF on or off), so we classify them separately for robustness.
In the main screen, the application shows the longest coherent signal detected so far.
Under the detected sequence, you will see a small triangle marking a specific sample. This mark means that the sequence looked coherent up to that point, and starting from there it could be just noise.
If the protocol is decoded, the bottom-left corner of the screen will show the name of the protocol, and going in the next screen with the right arrow will show information about the decoded signal.
In the bottom-right corner the application displays an amount of time
in microseconds. This is the average length of the shortest pulse length
detected among the three classes. Usually the data rate of the protocol
is something like 1000000/this-number*2, but it depends on the encoding
and could actually be 1000000/this-number*N with N > 2 (here 1000000
is the number of microseconds in one second, and N is the number of clock
cycles needed to represent a bit).
Using the LEFT and RIGHT buttons, the user can switch to the other application modes: if a signal was detected, the information view will show the details about the signal. In this mode, it is possible to use DOWN to go to a screen with an oscilloscope-alike view of the signal, and the ability to save (long press to OK) and resend (short press to OK) it.
This final screen shows in real time the high and low level that the Flipper RF chip, the CC1101, is receiving. This will makes very easy to understand if a given frequency is targeted by something other than noise. This mode is fun to watch, resembling an old CRT TV set.
Things to investigate:
Download the Flipper Zero dev kit and build it:
mkdir -p ~/flipperZero/official/
cd ~/flipperZero/official/
git clone --recursive https://github.com/flipperdevices/flipperzero-firmware.git ./
./fbt
Copy this application folder in official/applications_user.
Connect your Flipper via USB.
Build and install with: ./fbt launch_app APPSRC=protoview.
Drop the protoview.fap file you can find in the binaries folder into the
following Flipper Zero location:
/ext/apps/Tools
The ext part means that we are in the SD card. So if you don't want
to use the Android (or other) application to upload the file,
you can just take out the SD card, insert it in your computer,
copy the fine into apps/Tools, and that's it.
The code is released under the BSD license.
This application is only provided as an educational tool. The author is not liable in case the application is used to reverse engineer protocols protected by IP or for any other illegal purpose.
A big thank you to the RTL433 author, Benjamin Larsson. I used the code and tools he developed in many ways: