<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Radio sniffing Ethernet LAN cable</title>
	<atom:link href="http://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 11:32:29 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/comment-page-1/#comment-1733690</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 20:38:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189846#comment-1733690</guid>
		<description><![CDATA[Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems
https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html]]></description>
		<content:encoded><![CDATA[<p>Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems<br />
<a href="https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html" rel="nofollow">https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/comment-page-1/#comment-1733689</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 20:37:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189846#comment-1733689</guid>
		<description><![CDATA[https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html" rel="nofollow">https://thehackernews.com/2021/10/creating-wireless-signals-with-ethernet.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/comment-page-1/#comment-1733682</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 20:30:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189846#comment-1733682</guid>
		<description><![CDATA[https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/" rel="nofollow">https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/comment-page-1/#comment-1732868</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 Oct 2021 15:53:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189846#comment-1732868</guid>
		<description><![CDATA[https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/

Good news, everyone! Security researcher [Mordechai Guri] has given us yet another reason to look askance at our computers and wonder who might be sniffing in our private doings.

This time, your suspicious gaze will settle on the lowly Ethernet cable, which he has used to exfiltrate data across an air gap. The exploit requires almost nothing in the way of fancy hardware — he used both an RTL-SDR dongle and a HackRF to receive the exfiltrated data, and didn’t exactly splurge on the receiving antenna, which was just a random chunk of wire. The attack, dubbed “LANtenna”, does require some software running on the target machine, which modulates the desired data and transmits it over the Ethernet cable using one of two methods: by toggling the speed of the network connection, or by sending raw UDP packets. Either way, an RF signal is radiated by the Ethernet cable, which was easily received and decoded over a distance of at least two meters. The bit rate is low — only a few bits per second — but that may be all a malicious actor needs to achieve their goal.

https://arxiv.org/pdf/2110.00104.pdf]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/" rel="nofollow">https://hackaday.com/2021/10/27/ethernet-cable-turned-into-antenna-to-exploit-air-gapped-computers/</a></p>
<p>Good news, everyone! Security researcher [Mordechai Guri] has given us yet another reason to look askance at our computers and wonder who might be sniffing in our private doings.</p>
<p>This time, your suspicious gaze will settle on the lowly Ethernet cable, which he has used to exfiltrate data across an air gap. The exploit requires almost nothing in the way of fancy hardware — he used both an RTL-SDR dongle and a HackRF to receive the exfiltrated data, and didn’t exactly splurge on the receiving antenna, which was just a random chunk of wire. The attack, dubbed “LANtenna”, does require some software running on the target machine, which modulates the desired data and transmits it over the Ethernet cable using one of two methods: by toggling the speed of the network connection, or by sending raw UDP packets. Either way, an RF signal is radiated by the Ethernet cable, which was easily received and decoded over a distance of at least two meters. The bit rate is low — only a few bits per second — but that may be all a malicious actor needs to achieve their goal.</p>
<p><a href="https://arxiv.org/pdf/2110.00104.pdf" rel="nofollow">https://arxiv.org/pdf/2110.00104.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dev</title>
		<link>https://www.epanorama.net/blog/2021/10/26/radio-sniffing-ethernet-lan-cable/comment-page-1/#comment-1732267</link>
		<dc:creator><![CDATA[Dev]]></dc:creator>
		<pubDate>Wed, 27 Oct 2021 06:34:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189846#comment-1732267</guid>
		<description><![CDATA[I&#039;m happy to report that it&#039;s a fascinating article to read. Your essay taught me something new, and I think you&#039;re doing a fantastic job. Keep going.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m happy to report that it&#8217;s a fascinating article to read. Your essay taught me something new, and I think you&#8217;re doing a fantastic job. Keep going.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
