Nyan Box · Volume 5

Nyan Box Volume 5 — NRF24 / 2.4 GHz Toolset

Spectrum analysis, multi-channel sniff, jam, replay, Mousejack-class tools, the transmit-and-confirm workflow

Contents

SectionTopic
1About this volume
22.4 GHz spectrum analysis
3Multi-channel NRF24 sniff
4Mousejack-class tools
5Jam
6Replay + transmit-and-confirm
7The NRF24 toolset at a glance
8Resources

1. About this volume

Vol 5 covers the nyanBOX tools that run on the three NRF24 radios. Vol 3 covered the hardware — why three radios, how they’re wired, the antenna-isolation reality. This volume covers what you do with them: spectrum work, sniffing, the Mousejack family, jamming, and replay.

The triple-radio hardware (Vol 3) is what makes several of these tools meaningfully better than a single-NRF24 board. Where that’s the case, this volume says so explicitly.


2. 2.4 GHz spectrum analysis

The NRF24L01+ isn’t a spectrum analyzer — but it has a trick: its RPD (Received Power Detector) register flags whether received power on the current channel exceeds ~-64 dBm. Sweep the channel across the band, read RPD at each step, and you get a crude energy-detector spectrum.

2.1 How it works

   NRF24 RPD-sweep spectrum
   ═════════════════════════

   For each channel 0..125:
     1. Set NRF24 to channel N
     2. Enter RX mode briefly (~little hundred µs settle)
     3. Read RPD bit: 1 = power > ~-64 dBm, 0 = quiet
     4. Step to N+1

   With THREE radios, split the sweep:
     NRF#1 sweeps ch 0-41
     NRF#2 sweeps ch 42-83      → 3x faster full-band sweep
     NRF#3 sweeps ch 84-125

   OLED render — energy bar graph:

   2400 ────────────────────────────────── 2525 MHz
   ▁▁▃█████▃▁▁▁▁▃▇▇▇▃▁▁▁▁▁▁▁▃███▇▃▁▁▁▁▁▁▁▁
        ▲              ▲          ▲
       WiFi ch1      WiFi ch6   WiFi ch11
       (or BT, or a busy IoT band, or a camera...)

2.2 What it’s good for — and not

Good forNot good for
”Is this band busy?” — congestion surveyAmplitude accuracy (RPD is a 1-bit threshold, not a dBm reading)
Finding the active Wi-Fi channelsNarrow-signal resolution (1 MHz channel steps)
Spotting a strong continuous emitterAnything quieter than ~-64 dBm
The triple-radio 3× sweep speed-upA real spectrum display (that’s a HackRF / TinySA job)

The RPD-sweep spectrum is a coarse energy detector, not an instrument. But it’s genuinely useful as a fast “what’s loud in 2.4 GHz right now” check — and the triple-radio split makes it 3× faster than a single-NRF24 board. It’s also the substrate for the hidden-camera detection (Vol 7) — camera detection is, at its core, a smarter version of this sweep.

[FIGURE SLOT — Vol 5, § 2] Photo of the nyanBOX OLED running the 2.4 GHz spectrum sweep, showing the energy bar graph. Source: vendor product page. Caption when filled: “Figure 5.1 — The RPD-sweep spectrum display.”


3. Multi-channel NRF24 sniff

The headline NRF24 tool — and the one the triple-radio hardware most directly enables. Vol 3 § 6 covered the hardware “why”; this is the operational “how”.

3.1 The tool

   Multi-channel NRF24 sniff — OLED view
   ══════════════════════════════════════
   ┌────────────────────────────────┐
   │ NRF24 Sniff x3      pkts: 247  │
   ├────────────────────────────────┤
   │ R1 ch75  ▓▓▓▓▓░░  88 pkts      │
   │ R2 ch76  ▓▓░░░░░  31 pkts      │
   │ R3 ch77  ▓▓▓▓▓▓▓ 128 pkts      │
   ├────────────────────────────────┤
   │ last: R3 ch77 addr A1:B2:C3..  │
   │ [OK] log [↓] cfg [←] back      │
   └────────────────────────────────┘

Three radios, three channels, all listening continuously. Each captured packet shows channel + address + payload (within OLED limits).

3.2 The configuration that matters

ParameterWhy it matters
Channel per radioThe three channels you cover — pick by target protocol (Vol 3 § 9 channel map)
Data rate250 kbps / 1 Mbps / 2 Mbps — must match the target; wrong rate = no packets
Address width3-5 bytes — must match, or set to promiscuous-ish wildcard mode
AddressThe target’s pipe address — or a “sniff anything” config if the firmware supports it
CRC1 or 2 byte — must match

The NRF24 is not a true promiscuous receiver — it’s an addressed protocol radio. “Sniffing” NRF24 means either (a) you know the target’s address/rate/CRC and configure to match, or (b) you use the classic NRF24-promiscuous trick (set a 2-byte address of 0x00AA or 0x0055, disable CRC, and let preamble false-syncs leak packets). The nyanBOX firmware almost certainly implements the promiscuous trick for “sniff unknown” — verify the exact method on the unit.

3.3 The triple-radio payoff

This is the tool where three radios beats one cleanly (Vol 3 § 5 — it’s all-RX, so no antenna-coupling problem):

  • A channel-hopping wireless mouse that a single radio chases and half-misses → three radios on the hop set catch fully
  • A protocol you’re characterizing (you don’t yet know its channels) → three radios sample three points of the band at once, 3× faster characterization
  • The classic Mousejack workflow (§ 4) → three radios covering the Logitech channel set

3.4 The capture-storage limit

Reminder from Vol 2 § 7: the nyanBOX has EEPROM, not microSD. Long sniff sessions can’t dump everything to a card. Options:

  • Read hits off the OLED in real time
  • Pull the capture stream over USB-serial to a host (Vol 9 § 4) for a long session
  • Accept that the on-device log is a small rolling buffer

For a multi-hour sniff, plan to tether to a host for logging.


4. Mousejack-class tools

“Mousejack” is Bastille’s 2016 research into the NRF24-class wireless mice/keyboards — the vulnerability that lets an attacker inject keystrokes into a vulnerable wireless mouse/keyboard dongle. It’s the canonical NRF24-pentest workflow, and the nyanBOX’s NRF24 toolset is built around it.

4.1 The attack family

StageToolWhat it does
DiscoverMulti-channel sniff (§ 3)Find NRF24 mice/keyboards by their address + channel hopping
IdentifyAddress + protocol fingerprintLogitech Unifying? Microsoft? Generic? Determines exploitability
InjectKeystroke injectionSend crafted “keypress” packets to a vulnerable dongle
ConfirmTransmit-and-confirm (§ 6)One radio injects, two watch for the dongle’s response / the host’s behavior

4.2 Why the triple-radio helps the Mousejack workflow

   Mousejack with three radios
   ════════════════════════════

   Discover phase:  NRF#1, #2, #3 → 3 channels of the
                    Logitech hop set, parallel sniff.
                    Catch the target faster + fuller.

   Inject phase:    NRF#1 → inject keystrokes
                    NRF#2 → watch for dongle ACK
                    NRF#3 → watch an adjacent channel for
                            the dongle hopping away
                    = transmit-and-confirm (Vol 3 § 7)

A single-radio Mousejack tool does discover-then-inject sequentially on one radio. The nyanBOX can keep watching while it injects.

4.3 The posture line

Keystroke injection into someone else’s wireless mouse/keyboard is unauthorized access to a computer system — illegal essentially everywhere without authorization. The nyanBOX’s education framing almost certainly XP-gates this hard and frames it heavily. For tjscientist: the mechanics are educational; the use requires owned hardware or written authorization. Vol 11 § 3.

4.4 The honest capability note

Modern wireless mice/keyboards (post-2016) are mostly patched or encrypted — the Mousejack-vulnerable population has shrunk. The nyanBOX’s Mousejack tools are most useful as (a) an education demonstration of the attack class, and (b) a way to test whether a specific old dongle is still vulnerable. They are not a reliable “inject into any wireless keyboard” capability in 2026.


5. Jam

The nyanBOX can jam 2.4 GHz — transmit noise/garbage on a channel (or, with three radios, three channels) to deny that spectrum.

5.1 How NRF24 jamming works

   NRF24 jam mechanism
   ════════════════════

   Set NRF24 to continuous-carrier or constant-TX mode,
   on the target channel. The radio dumps RF energy
   continuously — any real signal on that channel is
   buried under it.

   With three radios:
     NRF#1 → jam ch X
     NRF#2 → jam ch Y    = three channels denied at once
     NRF#3 → jam ch Z

   Or "sweep jam": rapidly retune one+ radios across a
   band, denying a swath rather than fixed channels.

5.2 The hard posture line

Jamming is illegal in essentially every jurisdiction — FCC §333 in the US, equivalent statutes elsewhere. It’s not a gray area. It’s not “gray like deauth” — it’s a clear, enforced prohibition. The nyanBOX’s NRF24 jam tool exists; the legal reality is that you may operate it only:

  • Inside a verified RF-shielded enclosure (Faraday cage / anechoic chamber with confirmed <1 µW leakage)
  • With explicit authorization in a controlled test (rare, specialized)
  • As an inert education demonstration of why jamming is a problem — discussed, not transmitted

The nyanBOX’s education firmware almost certainly XP-gates jam to the highest tier and frames it heavily. Vol 11 § 3 is mandatory reading before this tool is ever activated. For tjscientist: treat jam as a “know it exists, understand the mechanism, essentially never transmit it” tool.

5.3 NRF24 jam is also weak

Even setting the legality aside: NRF24 jam at ~0 dBm (bare GTmini, Vol 3 § 2.2) is low-power. It denies spectrum in the immediate few meters, not a building. It’s a demonstration-scale capability, not an area-denial weapon. That’s a small mercy from a harm-reduction standpoint.


6. Replay + transmit-and-confirm

6.1 Replay

Capture an NRF24 packet (§ 3), retransmit it. Classic for:

  • Replaying a captured RC / toy / simple-IoT command
  • Testing whether a device accepts replayed packets (no rolling code → vulnerable)

The nyanBOX’s replay is the standard capture-then-retransmit. The triple-radio adds the confirm half:

6.2 Transmit-and-confirm — the triple-radio version

Vol 3 § 7 covered the hardware timing. Operationally:

   Transmit-and-confirm — operational flow
   ════════════════════════════════════════

   1. NRF#1 transmits the replayed packet
   2. (NRF#2, NRF#3 are deaf during the TX burst — Vol 3 § 5)
   3. TX burst ends; NRF#2 + NRF#3 immediately listen
   4. NRF#2 watches the channel the target answers on
   5. NRF#3 watches an adjacent channel (in case the
      target's protocol hops on response)
   6. OLED shows: TX sent → response heard? → on which channel?

   Result: you don't just "hope the replay worked" — you
   SEE the target's reaction (ACK / state change / hop).

This is the genuine value-add of the triple radio for active work. A single-radio board replays blind. The nyanBOX replays and watches.

6.3 The rolling-code wall

Most modern devices with any security use rolling codes — each command packet is single-use; a replayed packet is rejected. Replay works against:

  • Old/cheap fixed-code devices (some RC toys, very old remotes, naive IoT)
  • Devices where the rolling-code implementation is broken
  • Test scenarios with replay deliberately enabled

It does not work against properly-implemented rolling-code devices. The transmit-and-confirm capability is actually useful here — it tells you immediately whether the replay was accepted or rejected, so you’re not guessing.


7. The NRF24 toolset at a glance

   nyanBOX NRF24 / 2.4 GHz toolset
   ═════════════════════════════════════════════════════

   Tool                 Radios used   Posture    Triple-radio benefit
   ───────────────────  ───────────   ────────   ────────────────────
   Spectrum sweep       3× (split)    passive    3× faster sweep
   Multi-channel sniff  3× RX         passive    3 channels at once ★
   Mousejack discover   3× RX         passive    full hop-set coverage ★
   Mousejack inject     1 TX + 2 RX   GATED      transmit-and-confirm
   Jam                  1-3× TX       ILLEGAL*   3 channels denied
   Replay               1 TX          gated      —
   Transmit-and-confirm 1 TX + 2 RX   gated      the whole point ★

   ★ = the triple-radio hardware materially helps here
   * = jam: see Vol 5 § 5.2 and Vol 11 § 3 — essentially
       never transmit outside a shielded enclosure

   The triple-radio hardware delivers cleanest on the
   PASSIVE tools (sniff, discover, spectrum) — exactly
   the tools that are also legally safe. That's a happy
   alignment: the device's best capability is also its
   most-defensible-to-use capability.

8. Resources

NRF24 pentest canon

  • Bastille Mousejack research: https://www.mousejack.com/
  • Mousejack technical whitepaper: Bastille Networks
  • NRF24L01+ datasheet (register-level — RPD, FIFO, addressing): Nordic Semiconductor
  • nrf24-playground / promiscuous-mode NRF24 technique writeups (community)

Posture

Sibling reference

End of Vol 5. Next: Vol 6 is the drone RemoteID detection deep dive — the FAA/EASA RemoteID broadcast specifications, how the nyanBOX detects them, what is and isn’t detectable, and the RemoteID-watch workflow.