Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    'Deep Drill' Wi-Fi Scanner request

    Reply
    Page 1 of 2 | 1   2   | Next
    romx | # 1 | 2007-03-24, 09:05 | Report

    "A Kingdom for a program!"
    Can something make a program for 'deep drill' scanning of wi-fi access points?
    This program will be very useful!

    Simple algoritm of deep drills of APs.

    1. Scan a WiFi APs

    2. Get list of unprotected APs

    3. Trying to connect to (next) AP. If YES go to 4 if NO (MAC table protected) to 3 again.

    4. If succesfully connected, trying to get IP (gateway, DNS) via DHCP.

    5. If success, then ping by name any known good address (google.com for ex.), if fail go to 9.

    6. If good ping, then trying to connect to 80 port.

    7. If bad, trying to ping by IP. If 'ping-by-IP' good, then it's an AP with broken DNS but opened, set a known good DNS and ping by name again.

    8. check content from 80 port, if got any 'ogin' or 'assword' word, then it's a password protected (usually 'non-free') AP, go to p.3. If no 'ogin' or 'assword', and google connected, then it's good free AP.

    9. trying to set up a known IP's like 192.168.1.* (def.gw 192.168.1.1), 192.168.0.*, 10.0.0.* (or something else) and known good external DNSes (if it good open unprotected AP's without good DHCP it may helps), then go to 6.

    10. write a good APs to list and display list to user (or automatically connecting and trying to get mail, renew rss feeds and so on).

    Edit | Forward | Quote | Quick Reply | Thanks

     
    lucky-luke | # 2 | 2007-03-24, 10:27 | Report

    I supose that could be made with python. It looks not so complicated.
    It would be a "need to have" script.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    n800user | # 3 | 2007-03-24, 12:38 | Report

    I join this request

    Edit | Forward | Quote | Quick Reply | Thanks

     
    quentinwolf | # 4 | 2007-03-24, 12:48 | Report

    I also join this request. Would be a very handy utility to have on the 700 / n800.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Karel Jansens | # 5 | 2007-03-24, 12:58 | Report

    I have only a vague idea of what you're talking about but if it helps me getting a better WiFi-connection in the wild outdoors, me wantee.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    disq | # 6 | 2007-03-24, 12:59 | Report

    yep. good idea.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Milhouse | # 7 | 2007-03-24, 13:13 | Report

    Enhancement (already!): A history of past scans would be useful to speed up finding a usable AP which has been scanned (and known to work) in the past.

    +1 vote

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Toontje | # 8 | 2007-03-25, 09:43 | Report

    I second the request although it would take all the fun out of finding 'illegal' internet access yourself. :-)

    Edit | Forward | Quote | Quick Reply | Thanks

     
    marlaw | # 9 | 2007-04-18, 15:53 | Report

    I'm really interested in something like this too.
    I'm just about to start development with python and I will try to do something.
    In theory, you can do all this with a shell script ..
    If anyone wants to collaborate with me you can send me a message.

    I would even add, if the network is encrypted with wpa/wpa2/wep try dictionary attack, if doesn't work and is wep try collecting IV's to guess the key.

    :P

    Edit | Forward | Quote | Quick Reply | Thanks

     
    treasonx | # 10 | 2007-04-18, 16:03 | Report

    an automated way of running aircrack on a wep network would be a good addition.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 1 of 2 | 1   2   | Next
vBulletin® Version 3.8.8
Normal Logout