Archive for the ‘Programming’ Category
I created Entify to have the latest and greatest of not only my applications, but other’s too. including mostly all bleeding edge WiFi hacking and administration applications specifically compiled to take full advantage of all resources.
Entify will use my web-server as a repository for the source code tarballs.
I will be releasing an ALPHA copy to the Google Code page sometime this week or weekend. stay tuned!
A new project of projects! This new Live DVD will be optimized for WiFi-GPS-Bluetooth-Radio hacking.
WEAKERTH4N will continue to grow, but I will be focusing more on WarcarrierOS.
“This is a Wireless Professionals live disk. Here are the very first publicly available screen shots. I created scripts to display on-screen stats for WiFi, Bluetooth and GPS – just like the curses WARDRIVING application. I have patched and tested the Linux 3.7.10 Kernel with AUFS3.7, compacted custom CUDA 5.0 libraries, CUDA enabled cracking software, NVIDIA 310.x drivers, Radeon, Intel GPU drivers, bleeding edge compat-drivers and kernel compiled wireless drivers, smarter driver loading for different system configurations, my own ACPI scripts and key bindings for mostly all laptops, including support for Apple users, gcc 4.9, GPSd 3.2, mostly all of the latest wireless hacking tools and exploits (each one compiled and tested), spectrum analyzer support for 802.11, and loads of wireless administration and analysis software.
This project has been my dream for years. I wanted to bring together GPS, WiFi, Bluetooth, wireless (not just WiFi) hacking and, most importantly, wireless administration into one obsessive, finely tuned, polished and neatly packaged disk that is moderate in size.“
The Warcarrier application as has been re-coded and optimized for laptop screens and I have removed the bug from trying to load the files in FireFox (still not sure why that browser cannot open files with “:” in the name) which will be released tonight as a new version on the Google code page for Warcarrier. FreeRADIUS-WPE+Hostapd+ath9k works flawelessly for capturing WPA2Enterprise credentials right form the live disk. Also, I will upgrading and releasing to Google Code the WPA Phishing Attack.
I have also purchased a new 25dBi Yagi WiFi antenna and a converter from mini N to RP-SMA to test with the SR71e radio. The 14dBi panel antenna had a nice reach of about 1mi (5280ft) from the side of a mountain, across the Monongahela river right to my campus
Here is the view from behind the antenna:
Here is another clear view down to my campus with the antenna’s tripod:
The signal strength was excellent and had little trouble. This antenna was used with an ALFA 1W (claims to be 1000mW anyways (tx)). The ALFA WiFi adapter and it’s poor RTL8187 driver and RealTek radio were the worst adapters I have used in my experience with WiFi hacking. I will expand more on this topic when I do testing with the Atheros (ar9280) ath9k-based SR71e.
This weekend I will be purchasing an Ubertooth (for Bluetooth scanning and sniffing in passive mode) and will be installing drivers and writing code for the drivers for WarcarrierOS which may get integrated into the Warcarrier application. As of now, only probe requests are used by the Bluetooth devices and Net::Bluetooth – which is considered “active” scanning. “Passive” scanning is when the radio just listens, in which it can “hear” in a more stealth-like fashion.
wbar is an amazing light-weight dock application that I have been using with FluxBox for years. Recently, with the release of WEAKERTH4N: BLUE GHOST, I made my own icon theme and set for the distro which clashed with the white letters used in the text of wbar making it unreadable:
So I decided to download the latest version of wbar and take a looksy at the sauce. To compile this code you will need the following dependencies:
Which you can install on Debian systems with aptitude – no problem.
I use grep when troubleshooting or reverse engineering code – it’s my first go-to for analyzing other’s code. I grepped recursively for the word color and found the lines:
/* draw text */
imlib_context_set_color(0, 0, 0, 255);
imlib_text_draw(tw+1, th+1, cur_ic->text.c_str());
imlib_context_set_color(255, 255, 255, 255);
In the file
./src/core/SuperBar.cc This function [imlib_context_set_color] looks familiar and the values are R,G,B,A for red-green-blue-and transparency respectively. Also I knew that the color white is all colors combined and usually has the highest values: (HEX) #ffffff or in our case or 256 bit (RGB) (0-255), 255-255-255. Black is the lowest: (HEX) #000000 or 0,0,0 in 256 bit RGB. Then I looked up the RGB set for the color yellow to match my theme and found that it was 255,255,0 and HEX #ffff00. I changed the bottom function (since they are just layers – i figured the bottom layer was for the shadow) and ran:
make clean && make uninstall && make && make install
It worked! The first function [imlib_context_set_color] makes the color of the drop shadow, which is black. So then I decided to make the line unique by removing the spaces between the commas and integers like so:
which obviously didn’t break the function and then wrote a simple sed script to change the color on the fly -pre-compilation:
sed -i -r -e "s/(imlib_context_set_color\()[0-9]+,[0-9]+,[0-9]+,[0-9]+\)/\1$1,$2,$3,$4\)/" src/core/SuperBar.cc
Now we can just look up the color code in a chart like this one: http://www.tayloredmktg.com/rgb/ and pass the values ot the script like so:
./colorchange.sh 255 255 0 255
The lower the last number, the more transparent the text color will be, but make sure you match it with the shadow!
I recompiled the kernel with better Netfilter support and even more wifi drivers – I recompiled the NVIDIA 310 driver and compat-drivers. I added FreeRADIUS WPE, hostapd, hashcat, more scripts, and even on screen display scripts. (the WiFi one was m33b0′s idea). Also, I added more Hardware hacking utilities, Android hacking utilities, and changed the Grub screen resolution and configuration for faster booting.
Download it now! (hr.weaknetlabs.com) Thank you HaxRadio for hosting! :D