SlideShare a Scribd company logo
1 of 34
Download to read offline
-Maker-

DIY your Tools
cmj
1
Disclaimer
ALL CONTENT, WHETHER EXPRESS OR IMPLIED, ARE
OPEN INFORMATION. AUTHOR IN THE LEGAL IS
IRRESPONSIBLE FOR YOU.
2
• Ba a maker, you can
• Learn more what you need
• Enjoy more what you like
• Understand more what you used
3
Mission - Wifi AP
4
• I want to design a popular WiFi AP
• Everyone want to access
• Everyone like to access
• Also, I’m happy everyone access my Wifi AP
5
Design Flow
6
7
I want access WiFi
8
I want access WiFi
Your Wifi AP
9
I want access WiFi
Your Wifi AP
Expose Your Device - hostapd
10
I want access WiFi
Your Wifi AP
Expose Your Device - hostapd
Assign A IP address - dnsmasq
11
I want access WiFi
Your Wifi AP
Expose Your Device - hostapd
Assign A IP address - dnsmasq
Access WLAN - iptable
• hostapd
• A userspace daemon for wireless AP
• dnsmasq
• Lightweight DNS / DHCP server
• iptable
• Redirect WiFi packet into WLAN
12
So Easy ~
13
• Now we have a basic WiFi AP
• But not sweet enough~
• Who ?
• Why ??
14
• Now we have a basic WiFi AP
• But not sweet enough~
• Who ?
• Why ?
15
• If possible
• Everyone on the World is my custom…
• But only the 100m at most, limit by
• frequency band
• radio power
• … etc
16
• If possible
• Everyone on the World is my custom…
• But only the 100m at most, limit by
• frequency band
• radio power
• … etc
17
• If possible
• I want only one (of course, mine) WiFi AP
• But WiFI AP is located on everywhere
18
• If possible
• I want only one (of course, mine) WiFi AP
• But WiFI AP is located on everywhere
19
So …
The Trivial solution is Best solution
20
If it looks like a duck, sounds
like a duck, and walks like a
duck, then it probably is a duck
21
• In real scenario
• School, the total scope is larger than 100m
• You DO NOT want to repeat login.
• Did you realize that you switch to other AP
22
WiFI Roaming
23
• Limitation
• Same SSID
• Same Authentication method
• Same Password
24
• But the real flow are
1. Client send probe request (with SSID)
2. Server response
3. Client authentication
4. Server check and pass the authentication
25
• But the real flow are
1. Client send probe request (with SSID)
2. Server response
3. Client authentication
4. Server check and pass the authentication
26
You are the Super Star
27
• Be the popular, what can we get?
28
You No Pain I No Gain
29
You No Pain I No Gain
30
Who get the router, they own the network!
31
• Every packets through router
• From, To and Data
• Name, address, and everything you talk on the
network.
32
33
Thanks for your attention ~
34

More Related Content

Similar to Maker - WiFi AP

IPv6 at Home
IPv6 at HomeIPv6 at Home
IPv6 at HomeRIPE NCC
 
IPv6 at Home
IPv6 at HomeIPv6 at Home
IPv6 at HomeRIPE NCC
 
Bits of entertainment Take two
Bits of entertainment Take twoBits of entertainment Take two
Bits of entertainment Take twolzeltzer
 
WiFi Pentesting with aircrack-ng.pdf
 WiFi Pentesting with aircrack-ng.pdf WiFi Pentesting with aircrack-ng.pdf
WiFi Pentesting with aircrack-ng.pdfSalihuSalisu
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestDavid Sweigert
 
Bits of entertainment
Bits of entertainmentBits of entertainment
Bits of entertainmentlzeltzer
 
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...Askozia
 
6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friendForrest Chang
 
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptx
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptxEverything_You_Always_Wanted_To_Know_About_Wi-Fi.pptx
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptxPabloProao11
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?Rob Gillen
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewAmazon Web Services
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6Olle E Johansson
 
Canary Analyze All the Things
Canary Analyze All the ThingsCanary Analyze All the Things
Canary Analyze All the Thingsroyrapoport
 
CONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxCONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxangelito tomas
 

Similar to Maker - WiFi AP (20)

IPv6 at Home
IPv6 at HomeIPv6 at Home
IPv6 at Home
 
IPv6 at Home
IPv6 at HomeIPv6 at Home
IPv6 at Home
 
Wireless v2
Wireless v2Wireless v2
Wireless v2
 
Bits of entertainment Take two
Bits of entertainment Take twoBits of entertainment Take two
Bits of entertainment Take two
 
WiFi Pentesting with aircrack-ng.pdf
 WiFi Pentesting with aircrack-ng.pdf WiFi Pentesting with aircrack-ng.pdf
WiFi Pentesting with aircrack-ng.pdf
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFest
 
Bits of entertainment
Bits of entertainmentBits of entertainment
Bits of entertainment
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
 
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
 
6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend6 reasons Jubilee could be a Rubyist's new best friend
6 reasons Jubilee could be a Rubyist's new best friend
 
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptx
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptxEverything_You_Always_Wanted_To_Know_About_Wi-Fi.pptx
Everything_You_Always_Wanted_To_Know_About_Wi-Fi.pptx
 
Dmk bo2 k7_web
Dmk bo2 k7_webDmk bo2 k7_web
Dmk bo2 k7_web
 
IP address
IP addressIP address
IP address
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Advanced RF Design & Troubleshooting #AirheadsConf Italy
Advanced RF Design & Troubleshooting #AirheadsConf ItalyAdvanced RF Design & Troubleshooting #AirheadsConf Italy
Advanced RF Design & Troubleshooting #AirheadsConf Italy
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6
 
Canary Analyze All the Things
Canary Analyze All the ThingsCanary Analyze All the Things
Canary Analyze All the Things
 
CONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxCONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptx
 

More from Chia-Hao Tsai

[2019.05] HST - RegEx 101 ~ 1001
[2019.05] HST - RegEx 101 ~ 1001[2019.05] HST - RegEx 101 ~ 1001
[2019.05] HST - RegEx 101 ~ 1001Chia-Hao Tsai
 
[2019.02.16] hst - orm
[2019.02.16] hst  - orm[2019.02.16] hst  - orm
[2019.02.16] hst - ormChia-Hao Tsai
 
[2019.01.12] hst iptables 101 to 301
[2019.01.12] hst   iptables 101 to 301[2019.01.12] hst   iptables 101 to 301
[2019.01.12] hst iptables 101 to 301Chia-Hao Tsai
 
[2018.12.15] hst python object 102
[2018.12.15] hst   python object 102[2018.12.15] hst   python object 102
[2018.12.15] hst python object 102Chia-Hao Tsai
 
[2018.11.16] Python Object 101
[2018.11.16]  Python Object 101[2018.11.16]  Python Object 101
[2018.11.16] Python Object 101Chia-Hao Tsai
 
[2017.03.18] hst binary training part 1
[2017.03.18] hst binary training   part 1[2017.03.18] hst binary training   part 1
[2017.03.18] hst binary training part 1Chia-Hao Tsai
 
Rootkit 101 - 2nd Edition
Rootkit 101 - 2nd EditionRootkit 101 - 2nd Edition
Rootkit 101 - 2nd EditionChia-Hao Tsai
 
Learn python in 30 min - 3
Learn python in 30 min - 3Learn python in 30 min - 3
Learn python in 30 min - 3Chia-Hao Tsai
 
Passwd crack introduction
Passwd crack   introductionPasswd crack   introduction
Passwd crack introductionChia-Hao Tsai
 
Security coding c and c++ ch8(2)
Security coding c and c++   ch8(2)Security coding c and c++   ch8(2)
Security coding c and c++ ch8(2)Chia-Hao Tsai
 
Security coding c and c++ ch8 (1)
Security coding c and c++   ch8 (1)Security coding c and c++   ch8 (1)
Security coding c and c++ ch8 (1)Chia-Hao Tsai
 

More from Chia-Hao Tsai (15)

[2019.05] HST - RegEx 101 ~ 1001
[2019.05] HST - RegEx 101 ~ 1001[2019.05] HST - RegEx 101 ~ 1001
[2019.05] HST - RegEx 101 ~ 1001
 
[2019.02.16] hst - orm
[2019.02.16] hst  - orm[2019.02.16] hst  - orm
[2019.02.16] hst - orm
 
[2019.01.12] hst iptables 101 to 301
[2019.01.12] hst   iptables 101 to 301[2019.01.12] hst   iptables 101 to 301
[2019.01.12] hst iptables 101 to 301
 
[2018.12.15] hst python object 102
[2018.12.15] hst   python object 102[2018.12.15] hst   python object 102
[2018.12.15] hst python object 102
 
[2018.11.16] Python Object 101
[2018.11.16]  Python Object 101[2018.11.16]  Python Object 101
[2018.11.16] Python Object 101
 
[2017.03.18] hst binary training part 1
[2017.03.18] hst binary training   part 1[2017.03.18] hst binary training   part 1
[2017.03.18] hst binary training part 1
 
Rootkit 101 - 2nd Edition
Rootkit 101 - 2nd EditionRootkit 101 - 2nd Edition
Rootkit 101 - 2nd Edition
 
ELF 101
ELF 101ELF 101
ELF 101
 
Learn python in 30 min - 3
Learn python in 30 min - 3Learn python in 30 min - 3
Learn python in 30 min - 3
 
HoneyCon 2014
HoneyCon 2014HoneyCon 2014
HoneyCon 2014
 
Passwd crack introduction
Passwd crack   introductionPasswd crack   introduction
Passwd crack introduction
 
Security coding c and c++ ch8(2)
Security coding c and c++   ch8(2)Security coding c and c++   ch8(2)
Security coding c and c++ ch8(2)
 
Security coding c and c++ ch8 (1)
Security coding c and c++   ch8 (1)Security coding c and c++   ch8 (1)
Security coding c and c++ ch8 (1)
 
Build web server
Build web serverBuild web server
Build web server
 
Rootkit tw(0224)
Rootkit tw(0224)Rootkit tw(0224)
Rootkit tw(0224)
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Maker - WiFi AP

  • 2. Disclaimer ALL CONTENT, WHETHER EXPRESS OR IMPLIED, ARE OPEN INFORMATION. AUTHOR IN THE LEGAL IS IRRESPONSIBLE FOR YOU. 2
  • 3. • Ba a maker, you can • Learn more what you need • Enjoy more what you like • Understand more what you used 3
  • 5. • I want to design a popular WiFi AP • Everyone want to access • Everyone like to access • Also, I’m happy everyone access my Wifi AP 5
  • 8. 8 I want access WiFi Your Wifi AP
  • 9. 9 I want access WiFi Your Wifi AP Expose Your Device - hostapd
  • 10. 10 I want access WiFi Your Wifi AP Expose Your Device - hostapd Assign A IP address - dnsmasq
  • 11. 11 I want access WiFi Your Wifi AP Expose Your Device - hostapd Assign A IP address - dnsmasq Access WLAN - iptable
  • 12. • hostapd • A userspace daemon for wireless AP • dnsmasq • Lightweight DNS / DHCP server • iptable • Redirect WiFi packet into WLAN 12
  • 14. • Now we have a basic WiFi AP • But not sweet enough~ • Who ? • Why ?? 14
  • 15. • Now we have a basic WiFi AP • But not sweet enough~ • Who ? • Why ? 15
  • 16. • If possible • Everyone on the World is my custom… • But only the 100m at most, limit by • frequency band • radio power • … etc 16
  • 17. • If possible • Everyone on the World is my custom… • But only the 100m at most, limit by • frequency band • radio power • … etc 17
  • 18. • If possible • I want only one (of course, mine) WiFi AP • But WiFI AP is located on everywhere 18
  • 19. • If possible • I want only one (of course, mine) WiFi AP • But WiFI AP is located on everywhere 19
  • 20. So … The Trivial solution is Best solution 20
  • 21. If it looks like a duck, sounds like a duck, and walks like a duck, then it probably is a duck 21
  • 22. • In real scenario • School, the total scope is larger than 100m • You DO NOT want to repeat login. • Did you realize that you switch to other AP 22
  • 24. • Limitation • Same SSID • Same Authentication method • Same Password 24
  • 25. • But the real flow are 1. Client send probe request (with SSID) 2. Server response 3. Client authentication 4. Server check and pass the authentication 25
  • 26. • But the real flow are 1. Client send probe request (with SSID) 2. Server response 3. Client authentication 4. Server check and pass the authentication 26
  • 27. You are the Super Star 27
  • 28. • Be the popular, what can we get? 28
  • 29. You No Pain I No Gain 29
  • 30. You No Pain I No Gain 30
  • 31. Who get the router, they own the network! 31
  • 32. • Every packets through router • From, To and Data • Name, address, and everything you talk on the network. 32
  • 33. 33
  • 34. Thanks for your attention ~ 34