############################# # Server controlling HackRF # ############################# 1. Login @10.1.141.71 (windows testing laptop), then open "GNURadio Command Prompt". (which was installed by David De Lorenzo) 2. Open GNURadio Command Prompt, install flask, waitress, flask_httpauth >> "C:\Python\GNURadio-3.8\tools\python3\python.exe" "C:\Python\GNURadio-3.8\tools\python3\Scripts\pip3.9.exe" install flask wairtress flask_httpauth 3. Check out GPSTOOLS. DSD library is needed for server.py to control hackrf on windows. >> cd [PATH_TO_INSTALL] >> cvs co GPSTools # Folder structure: # GPSTools/ # ├─ pythonTools # │ └─ DSD # └─ AntiJamTest # └─ server_control_hackrf 4. Run Server with python3 >> set GPSTOOLS=[PATH_TO_GPSTools] (eg. C:\Users\\GPSTools) >> cd %GPSTOOLS%\AntiJamTest\server_control_hackrf\web\app >> "C:\Python\GNURadio-3.8\tools\python3\python.exe" %GPSTOOLS%\AntiJamTest\server_control_hackrf\web\app\app_hackRF.py >> cd %GPSTOOLS%\AntiJamTest\server_control_hackrf >> "C:\Python\GNURadio-3.8\tools\python3\python.exe" %GPSTOOLS%\AntiJamTest\server_control_hackrf\server.py OR # Edit run_control_hackrf.cmd and run_web_hackrf.cmd with the correct path to file for server.py and app_hackRF.py, then double click them for launching OR # Edit and add run_control_hackrf.cmd and run_web_hackrf.cmd to Windows Task Scheduler to keep it running after reboot(need admin account) 5. Check server at http://10.1.141.71:10004/site-map