summaryrefslogtreecommitdiff
path: root/noncore/net/wellenreiter/README
blob: af2e6115f3346c093e09c2d90ac23d530ccb8b02 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
/*************************************************************************/
/*                W e l l e n r e i t e r   I I                          */
/*               ===============================                         */
/*                                                                       */
 /*                                          Version: Opie-ALPHA-January */
/*************************************************************************/

--------------------------------------------------
Release Notes for Opie-ALPHA Version January 2002
--------------------------------------------------

=====================
= Supported Devices =
=====================

* low-level orinoco_cs-based (including prism2 and spectrum_cs)

=====================
=      Build        =
=====================

To compile Wellenreiter within the Opie build environment, add the
following directories to $OPIEDIR/Makefile, e.g. to 'NONAPPS='

noncore/net/wellenreiter/libwellenreiter \
noncore/net/wellenreiter/daemon \
noncore/net/wellenreiter/contrib/orinoco_hopper \
noncore/net/wellenreiter/gui

./configure and rebuild. Note that you need libpcap in your toolchain.

To compile Wellenreiter within the OZ build environment, add the
following lines to $OPIEDIR/packages
CONFIG_WELLENREITER noncore/net/wellenreiter/libwellenreiter libwellenreiter.pro
CONFIG_WELLENREITER noncore/net/wellenreiter/daemon daemon.pro
CONFIG_WELLENREITER noncore/net/wellenreiter/gui gui.pro
CONFIG_WELLENREITER noncore/net/wellenreiter/contrib/orinoco_hopper orinoco_hopper.pro

make -f Makefile.test clean-configs
cd <BUILDROOT>
make SUBDIRS=packages/opie package

=====================
=     Install       =
=====================

Alternatively, you can use our precompiled ipk. Get it from
http://opie.net.wox.org/wellenreiter/current/. This also includes a recent libpcap.

=====================
=       Run         =
=====================

There are two possible modes: <Manual> and <Automatic>. I suggest, you
start with the <Automatic> Mode. This works just using the "Start"
and "Stop" Pushbuttons in the Wellenreiter GUI. If this doesn't work,
then use the following strategy:

1. Place card in monitor mode. This is device dependent.

   Caution: Don't do this while you're logged in via ssh
   or otherwise using the wireless interface - your connection
   will freeze: The card can't be used normally when sniffing!

   For most orinoco-based cards this can be done using either
   'iwpriv <interface> 2' or 'iwpriv <interface> 2 1'.  
   
   You can check if this works, by calling 'ifconfig <interface>'.
   If you see 'Protocol: UNSPEC' and an unusual long MAC-Address,
   then your card has been successfully set to the monitor mode.

2. Start a channel hopper. A wireless card has several channels
   (e.g. radio frequencies) here it can listen for beacons.
   Beacons are management data frames from other stations.
   Remember, this is radio transmission, so the card has to be
   "tuned" to a certain channel to be able to receive the beacons.
   
   In order to scan the complete frequency spectrum and thus be able
   to detect all available stations, you have to 'hop' through the
   channels frequently. You can do this manually (e.g. with 'iwconfig')
   [hahaha] or you can use a channel hopper.  
   
   For convenience, the current Wellenreiter Alpha comes with a 
   channel hopper for Orinoco-based cards. Start this via 
   orinoco_hopper <interface>.

3. Start the Wellenreiter sniffing daemon: wellenreiterd.

4. Start the Wellenreiter GUI and sniff like hell. Don't press the button
   "Start Scan" yet, because it enables the demo mode and will crash the
   wellenreiterd daemon if running.

=====================
=     Credits       =
=====================

Sniffer: Max Moser <max@remote-exploit.org>
Communication and Protocol: Martin J. Muench <mjm@remote-exploit.org>
GUI: Michael Lauer <mickeyl@handhelds.org>