[CRTech] Christian Radio Tech [MSG 79176]
[Thread Prev] [-- Thread Index --] [Thread Next] [Date Prev] [-- Date Index --] [Date Next]
RE: KLOVE RDS hacked
To: CRTech <crtech@crtech.org>
Subject: RE: KLOVE RDS hacked
From: Nathaniel Steele <nathaniel.steele@icloud.com>
Date: Tue, 14 Mar 2017 14:20:35 -0600
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=icloud.com; s=4d515a; t=1489522840; bh=NqOlUGnIU5VNz0v8QvFWhpshlhLyjfACFE0l+MVmv/w=; h=From:To:Date:Message-id:Subject:MIME-version:Content-type; b=RaJ0EVoYIVRZoW6wlrhH1frZ6OW1q0m/JA317rWpUE51MEs1/ZESQ0CqxS72bM6dL ERfvgkAFgnQxrE6PF3OY8br2ac1CpU06jgtMUL95C8KI2LJPpIDTg9T3Sn6ec1Dmn7 WSOEQ2mUH25zl0BfFkXK+V7vVRoC9ySr1nPGppJ9dTETcGqRtPrQHI9cycwpzQuWa4 MecbIeH+ecwmxToHx4jvJwEXE9HkGQ8NgVQ727DrXuHFEUl4jlBFj5IFlZLIseSy6T xVIkitPvETSTbV/zUi5Vt+GqShjuB0H1zrwG1SzrEkfPVsDPu1t4KdMVQMKNskbOQG hIs3djLsozFxg==
In-reply-to: <009a01d29cfe$77c3e9c0$674bbd40$@pilgrimradio.com>
References: <BLUPR06MB61080B71C125B1951F6B1DCD1240@BLUPR06MB610.namprd06.prod.outlook.com> <15acd183480.27ea.ecb7cb34b851c43635e81132be394647@me.com> <009a01d29cfe$77c3e9c0$674bbd40$@pilgrimradio.com>
User-agent: AquaMail/1.8.1-193 (build: 100800100)

I have used al three methods. Satellite and stl are by far the most secure.
Sometimes you have a site that is only fed by IP.

Sometimes ypu may be using the seriel port but still have ip hookwd up for remote monitoring or control. In tht bc asw if you can get in you cam switch it to accept the data over ip instead.

On March 14, 2017 2:07:02 PM Bill Hurne <billhurne@pilgrimradio.com> wrote:

For now playing RDS data we’re using a serial data channel over our satellite network.   Pretty tough to hack that.   It keeps working when the web goes down at remote sites.

 

I had also used a serial data channel on microwave STL.

 

Bill

 

From: Nathaniel Steele [mailto:nathaniel.steele@icloud.com]
Sent: Tuesday, March 14, 2017 6:53 AM
To: CRTech
Subject: Re: [CRTech] KLOVE RDS hacked

 

If you know anything abput rds This would be fairly easy to pull off if the unit was exposed to the public internet.

People you must start using VPN routers.

Its very common for rds data to be sent as udp packets.

Id speculate that this device was fou d on a list similar to thw barix devices in the past. Once you know the type of unit you can get the data format from its manual. Then you just have to send the data to the ip adress in the right format.

On March 14, 2017 7:04:32 AM Andy Lynch <andy@myitguys.us> wrote:

I wanted to share this one with the CR Tech community … I’d like to know how this happened …

 

http://longisland.news12.com/news/radio-station-s-digital-display-hacked-with-anti-trump-message-1.13239519

 

Andy

 

References: KLOVE RDS hacked
(Andy Lynch <andy@myitguys.us>, 14 Mar 2017 13:04:21 -0000)
Re: KLOVE RDS hacked
(Nathaniel Steele <nathaniel.steele@icloud.com>, 14 Mar 2017 13:53:48 -0000)
RE: KLOVE RDS hacked
("Bill Hurne" <billhurne@pilgrimradio.com>, 14 Mar 2017 20:06:58 -0000)
Prev by date: RE: KLOVE RDS hacked
(Bill Hurne, 14 Mar 2017 20:06:58 -0000)
Next by date: T12 to T8 Flourescent
(Bill Hurne, 14 Mar 2017 21:59:32 -0000)
Prev by thread: RE: KLOVE RDS hacked
(Bill Hurne, 14 Mar 2017 20:06:58 -0000)
Next by thread: hacking continued
(Terry Cowan, 14 Mar 2017 15:43:11 -0000)
CRTech.org