Twenty three dollars. That’s all this tiny pen-testing device will set you back. And there really isn’t much to it. [Kevin Bong] came up with the idea to use a Wifi router as a bridge to test a wired network’s security remotely. He grabbed a TP-Link TL-WR703N router, a low-profile thumb drive, and a cellphone backup battery; all cheaply available products.
No hardware hacking is necessary to connect the three components. The only other preparation needed is to reflash the router firmware with OpenWRT and load it up with common pen-testing software packages like Netcrack and Airhack.
[Kevin] calls this a drop box, because you find an Ethernet jack, plug it in, and drop it there. You can then connect to the router via Wifi and begin testing the wired network security measures. We’re sure images of espionage pop into your head from that description, but we’re certain this can be useful in other ways as well. If you ever find yourself with an Ethernet connection but no access to Wifi this is a quick way to setup an AP.
This Nexus wireless weather station has an array of weather sensors that you mount outside and monitor on the LCD screen. It also has the ability to stream the data over USB, but that feature is only supported in Windows and the companion software leaves a lot to be desired. Here’s a technique that will let you unlock the potential of the data by streaming it to your Linux box or directly to the Internet.
It turns out that grabbing the data via Linux has been made quite easy thanks to a package called TE923 (translated). With the base unit connected via USB, the software will pull down a string of colon-separated data which will be easy to parse using your favorite scripting language. But what if you don’t want to tether this to a computer?
The project goes one step further by using a Carambola board. This is a WiFi board with a USB port on it. It runs OpenWRT so getting TE923 going is as simple as building the package. The best part is, any wireless router that runs OpenWRT (or DD-WRT, etc.) and has a USB port can substitute for this board. With the module connected to the station, data is pushed to the Pachube website to serve as a custom web readout.
[Heli] had a WRT300N wireless router sitting around collecting dust. He decided to squeeze at bit more entertainment value out of it by seeing if he could pull off a RAM upgrade. He managed to double the router’s RAM and posted a walk through (translated) to help you do the same.
Swapping out surface mount RAM chips isn’t the easiest thing in the world and you must wondering what prompted this. It seems he wanted to run the LuCI package on the router but it was slow (or even incapable) of booting with the stock hardware’s 16 Mb. He first sourced some pin-compatible replacement chips from an old Pentium III computer. While his soldering iron was hot, he also wired up a JTAG header, which connects via the red wires just visible to the left. When he first fired up the unit he was happy that it was able to boot, but it still only detected 16 Mb.
It turns out you’re going to need to roll your own kernel to get it to take advantage of the upgrade. Source code for OpenWRT is easy to find and there’s plenty of guides for compiling it. If you try this, make sure to read [Heli’s] post carefully as he’s got some important configuration information that will help you to avoid bricking your router.
[Nathan] had an small router kicking around and thought that he might as well put it to good use. He had always been interested in getting a better handle on his espresso machine, and figured that the router would be a perfect Linux-based PID controller.
He installed OpenWRT on the router, then disassembled it in order to get access to the router’s GPIO pins. He built a small PCB that allows him to get temperature info from the machine to the router using i2c. [Nathan] put together a PID package for OpenWRT, allowing him to control the machine over SSH, though he may build in a user-friendly web interface sometime in the future.
He says that most espresso machine PID controllers he has seen come in the form of big ugly boxes slapped on the side of the machine’s case, though we have to disagree with him on that point. Opinions aside, he is going for a minimalist design, and while he says that he is only about half way through the project, we think things are looking promising so far.
When everything is said and done, we hope to get a much closer look at all of his code, schematics, and more information on the router he used as well.
The Broadband Internet Service BenchMARK is an open source initiative to put tools in the hands of the common Internet user that will make measurement and analyzation of home network traffic easier. It targets LAN and WAN network utilization by measuring latency, packet loss, jitter, upstream throughput, and downstream throughput. Of course gathering data isn’t worth anything unless you have a way to present it, and to that end the Project BISMark team has been developing a web interface where you can view the usage of anyone who’s running the firmware.
The project builds on top of OpenWRT, which means that you should be able to run it on any router that’s OpenWRT compatible. This includes the ubiquitous WRT54G routers and many others. We remember when DD-WRT added bandwidth monitoring as part of the standard release, which really came in handy when the stories about ISP bandwidth capping started to hit. We’re glad to see even more functionality with this package as it can be hard to really understand what is going on in your network. After the break you’ll find a video detailing the features of BISMark.
Continue reading “Measuring home networks with BISMark”
Hackaday forum member [Emeryth] recently posted his newest creation, the Wifon 2.0, which is an update to a project we featured last year. The second iteration of the device looks to make several improvements on the already solid concept.
Ditching the simple 16×4 LCD, version 2 sports a full color 320×240 touch panel LCD. A faster STM32 micro controller replaces the Atmega88 he used the first time around, allowing him to create a much more advanced user interface. The micro runs the ChibiOS/RT real time operating system, which enables multitasking, making the entire project a lot easier. Like the first version, an original Fonera performs all of the pen testing, though this time around he has ditched the vanilla DD-WRT distro for Jasager, which is purpose-built for running the Karma attack.
The project is coming along nicely, and [Emeryth] says he has a few simple apps running on the device already. He has found that running several applications on the device simultaneously is testing the practical limits of the Foneras capabilities, though he may add more memory to the router in order to squeeze a little more life out of it.
[via Hackaday forums]
Hackerspaces are always looking for novel ways to let their members know that they are open for business, and this notifier [Angus] from Make, Hack, Void recently put together is no exception.
While dumpster diving one day, he came across a fantastic-looking lab power supply from the ‘70s. He gutted it, saving the variable transformer for a future project, and started constructing his notifier. When someone enters the hackerspace, they simply set the dial on the “Space Probe” to the amount of time they expect to be there. The built-in Seeduino sends the data over Bluetooth to an OpenWRT-enabled router, which uses a couple of Lua scripts to notify members via email and Twitter.
Since almost all of the processing is done on the router side, it leaves the Arduino in the probe with little more to do than flash an LED and send ASCII status messages any time the knob is turned. [Angus] is well aware that this would probably make most people’s heads spin, but he hopes that other hackerspace members use that untapped potential to further enhance the notifier.
Stick around to see the Space Probe in action, and if you are interested in seeing what other hackerspaces use to keep their members in the know, check out this status switch from Hack42.
Continue reading “Wireless hackerspace status notifier”