We turn a household router into a hack station

    I decided to write an article about my experience in turning a domestic router into a hack station.
    An attack on WPS sometimes takes more than 10 hours. What to brute? The choice is not big:
    - PC - compatible hardware
    - Android - devices
    - Specialized devices like WiFi Pineapple
    There was a task to brute at work, I did not want to leave the laptop. I decided to try Android smartphone. It turned out that the monitor mode in the Wi-Fi driver refuses to work correctly. He carried out his task with a router.

    Choosing a Wireless Router


    Before the router, I set the following criteria:
    - the presence of OpenWrt / DD-WRT / etc firmware for installing Aircrack-ng, Reaver / Bully
    - the presence of a USB port
    - a removable antenna (it was required to take the antenna out of the room) The

    reality turned out to be not so rosy. There were not many actual devices for sale with such characteristics.
    The first router I purchased to turn his hack station was UPVEL UR-326N4G . However, he had to be returned to the store. UPVEL's OpenWrt did not support connecting USB drives. It was also impossible to connect modules for full USB support due to insufficient free space.

    I approached the choice of the second router more seriously. Was purchased by ASUS RT-N10UB. At first glance, the only drawback was the lack of OpenWrt firmware for this model. But there were DD-WRT, Tomato, firmware from Oleg. It seems to be not bad. Installed OPKG under DD-WRT, mounted USB Flash. Deployed software Aircrack-ng. I tried to put airmon-ng Wi-Fi in monitor mode. And then I was disappointed, it turned out that his BCM5357 could not go into monitor mode.

    This ASUS RT-N10U B was very difficult to change to another router. DNS is an extremely tight store. And so finally I took the TP-Link TL-MR3220 v2 . It turned out that it uses Atheros AR9331, the same is installed in Pineapple Mark V.

    imageimage

    Hacking


    The firmware from the OpenWrt website for TP-Link TL-MR3220 v2 did not have modules for mounting USB drives. I had to look for a modified version: https://app.box.com/s/cqk23ztqlux1zs034896
    The installation process is described in detail here (simple installation by OEM method).
    So, OpenWrt rolled out, everything is configured by default.
    Now we are preparing a USB drive. It is necessary to format the USB flash drive in Ext3 (the most reliable choice of FS, it will not work with FAT).
    We connect the USB drive to the router and reboot it. Next, go to the web interface 192.168.1.1. Open the System ⇾ Mount Points tab

    Next, as in the screenshots:




    Next, open the Network ⇾ Wifi tab, clickEnable on the interface (radio1)

    It is necessary to change the default password, otherwise you will not be able to log in through SSH.
    Reboot.
    Our flash drive will be mounted in / tmp / overlay-disabled
    Now about the most important thing, about software. For pentests, we need the following set:
    • aircrack-ng
    • reaver
    • bully

    If you want to install the utilities yourself, you need to do the following:

    echo "dest usb /tmp/overlay-disabled" >> /etc/opkg.conf
    

    You need to install with the -d usb switch
    Example:
    opkg install -d usb aircrack-ng
    TP-Link software TL-MR3220 v2 is suitable from ar71xx

    But for those who do not want to waste time installing or assembling utilities, I offer a ready-made kit that you need copy to the root of the flash drive: https://yadi.sk/d/5WUca8OrhkULA
    Versions:
    • aircrack-ng - 1.1-3
    • bully - 1.0-22
    • reaver with pixie support !


    Immediately after entering SSH, you need to apply the following patches:

    export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/tmp/overlay-disabled/usr/lib
    export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/tmp/overlay-disabled/lib
    export PATH=$PATH:/tmp/overlay-disabled/usr/bin
    export PATH=$PATH:/tmp/overlay-disabled/usr/sbin
    

    Please do not kick much in the comments, because everything was done in haste.

    Conclusion


    How to use these utilities I will not describe here. I will point out only one nuance. In order for airmon-ng to be able to iterate over the channels, do the following:

    ifconfig wlan0 down
    iw reg set BO
    iwconfig wlan0 txpower 27
    airmon-ng start wlan0
    

    Thank you for attention!

    Also popular now: