Go Down

Topic: Arduino with monitor mode wifi  (Read 364 times) previous topic - next topic

djarah

Oct 16, 2020, 06:46 pm Last Edit: Oct 16, 2020, 07:02 pm by CrossRoads
it would be perfect if we get Arduino  wifi  chipset that supports monitor mode

1: What is Monitor mode.
Tracking mode, or RFMON (Radio Frequency Monitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike mixed mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to be associated with an access point or a private network first. Monitoring mode is applicable only for wireless networks, but mixed mode can be used in both wired and wireless networks. Monitor mode is one of eight modes in which 802.11 wireless cards can operate: Master (operating as access point), Managed (also known as client, station), Private, Repeater, Mesh, WiFi Direct, TDLS, and Monitor mode.


2: What it is used for.
Tracking mode uses include: geo-packet analysis, tracking pervasive traffic, and acquiring Wi-Fi technology knowledge through hands-on experience. It is especially useful for checking unsafe channels (such as those protected by WEP). Monitor mode can also be used to help design Wi-Fi networks. For a given area and channel, the number of Wi-Fi devices currently in use can be discovered. This helps create a better Wi-Fi network that reduces interference with other Wi-Fi devices by selecting the least used Wi-Fi channels.
Software such as KisMAC or Kismet offers a user interface for passive wireless network monitoring, together with packet analyzers that can read pcap files.
e wifi
Arduino

CrossRoads

How is a WEP protected channel considered unsafe?
Designing & building electrical circuits for over 25 years.  Screw Shield for Mega/Due/Uno,  Bobuino with ATMega1284P, & other '328P & '1284P creations & offerings at  my website.

djarah

#2
Oct 16, 2020, 07:17 pm Last Edit: Oct 18, 2020, 09:32 am by djarah
Security researchers have discovered security problems that let malicious users compromise the security of WLANs (wireless local area network) that use WEP (Wired Equivalent Privacy) -- these, for instance:

  • Passive attacks to decrypt traffic: These are based on statistical analysis.
  • Active attacks to inject new traffic from unauthorized mobile stations: These are based on known plaintext.
  • Active attacks to decrypt traffic: These are based on tricking the access point.
  • Dictionary-building attacks: These are possible after analyzing enough traffic on a busy network.

CrossRoads

Couldn't the same be done on unprotected networks even easier?
Designing & building electrical circuits for over 25 years.  Screw Shield for Mega/Due/Uno,  Bobuino with ATMega1284P, & other '328P & '1284P creations & offerings at  my website.

Go Up