Operation
FISSURE is meant for people of all skill levels. Students or beginners can navigate through lessons and tutorials on how to interact with various wireless technologies. The User Dashboard offers friendly visual aids that demonstrate the RF device assessment process from start to finish. Beginners can also evade the hurdle that is traditionally associated with installing open-source tools - as the installer consists of a list of checkboxes for installing programs and dependencies. Meanwhile developers, educators, and researchers can use the framework for their daily tasks or to expose their cutting-edge solutions to a wider audience. Future development will draw heavily from feedback and interaction with the open-source community.
Start-Up Procedures
Open a terminal and enter fissure
Attach hardware and assign to components using the hardware buttons (see below)
Click the “Start” button to kick off automation and access remaining tabs
Click the “Start” buttons for individual components such as TSI or PD to trigger operations
Networking Configuration
FISSURE was originally designed to run its major Python components on different computers across a network. The network connections were simplified to run every component locally on one computer. Future updates may restore this functionality if the components are matured enough to require simultaneous operation and distributions in processing.
Automation Tab
Select Automation Mode
Manual
User confirms all phases and can edit parameters
Discovery (Disabled)
Mostly automated, system chooses which signals to target and process
Target (Disabled)
User-defined specifications, only pursue targets fitting certain criteria
Select target protocol
Configure SOI auto-select criteria (optional)
Lock search band (optional)
Check RF hardware connections
Click Start
Custom (Disabled)
User creates any combination of settings
TSI Tab
Detector/Sweep
Click Start
Add search bands to table
Adjust Advanced Settings
Click Update TSI Configuration
Blacklist frequency ranges
View detected signals
Search signals by frequency in library
Conditioner (Future)
Tune, filter, separate, record, isolate
Feature Extractor (Future)
Select AI/ML technique, acquire feature set
Classifier (Future)
Choose AI/ML models, classify protocols/emitters, compare results
PD Tab
Status
Start Protocol Discovery (PD)
Demodulation
Search library for flow graphs
Start demodulation flow graph
Bit Slicing
Search for preambles
Slice buffer by preamble
Determine field delineations
Data Viewer
Enter binary or hex data, perform binary operations
Fill Protocol Matching table, apply against protocols in library
Manually send hex data to PD buffer for analysis
Dissectors
Create Lua sissectors for new packet types
Follow lesson on Lua dissectors
Click Update Wireshark to copy all FISSURE dissectors to Wireshark folder
Sniffer
Start demodulation flow graph with sniffer sink
Launch sniffer flow graph created for packet type
Manually send data to sniffer port
CRC Calculator
Enter hex, select configuration, calculate CRC
Enter two messages with known CRCs, find polynomial
Attack Tab
Single-Stage
Select protocol, modulation type, hardware combination
Double-click attack in tree widget
Configure attack variables
Start Attack
Apply changes while running flow graphs
Multi-Stage
Double-click attack in tree widget or click Add button
Adjust durations and reorder attacks
Click Generate
Adjust variables, Save, Load, select Repeat
Click Start
Fuzzing (Fields)
Choose fuzzing Fields attack (if available)
Choose protocol subcategory
Check fields, select type, enter limits
Start Attack
Fuzzing (Variables)
Choose fuzzing Variables attack
Load flow graph
Select variable
Start Attack
History
View attack history, delete rows
IQ Data Tab
Record
Assign device to IQ hardware button
Adjust settings in reference to applicable GNU Radio sinks
Record signals to IQ file(s)
Playback
Configure settings or copy Record settings
Click Play
Inspection
Double-click flow graph or click Load, Start
Adjust variables in GUI
Crop
Double-click IQ file in Viewer
Enter name for cropped IQ file
Adjust Start/End samples in Viewer
Click Crop
Convert
Choose input file, name output file
Select file types
Click Convert
Append
Choose/enter file 1, file 2, output file
Check Null to append samples to the front or end
Click Append
Transfer
Copy folders or files to new locations
Timeslot
Makes copies of a message at regular intervals
Choose input file with zeros before and after signal
Adjust sample rate, period, and number of copies
Click Pad Data
Overlap
Plot data, store data, shift data, add data together
Resample
Select input file, specify output file, choose rates, resample
OFDM
Experimental
Normalize
Select input file, speciy output file, choose min/max, normalize
Viewer
Choose data folder
Double-click/Load File to read data
Plot All, plot range, click End to detect last sample
Use toolbar to zoom, pan, save
Click Cursor, select two points on plot, Get Range
Use functions and analysis buttons
Click gear icon to adjust options
Archive Tab
Download
Select row in Online Archive table
Click Download
Plot or delete
Replay
Double-click downloaded file or press Add button
Build and configure playlist
Check Repeat, click Start
Packet Crafter Tab
Packet Editor
Select protocol and packet type
Edit field values
Calculate CRC (when applicable)
Assemble message
Construct packet sequence
Save sequence to file
Scapy
Put wireless interface in monitor mode
Select 802.11x and packet type
Edit field values
Click Load Data
Click Refresh, enter interval, choose interface
Click Start
Library Tab
Browse
Choose FISSURE YAML file
Look at the contents
Gallery
Select protocol
Click through pictures
Search
Enter information for signals of interest (SOIs)
Enter data values for messages in library
Choose the checkboxes to use during search
Search Library
Remove
Select Protocol
Choose types to remove from library
Click associated Remove button
Add
Create new protocol
Add modulation type, packet type, signal of interest, statistics, demodulation flow graph, and attacks to existing protocol
Log Tab
System Log
Filter messages to view from log, click Refresh
Session Notes
Make notes and save attack history, system log, and session notes