The FCC, some FAANGs, and others are motivated to see more innovation in the wireless space to try to see what new tech can come about. Unfortunately, the expertise is surrounded in jargon, domain and tribal knowledge, and can be very frustrating for someone who wants to take the shortcut route to running a mobile network. I aim to try to cut through a lot of the jargon and extra stuff that can get a person lost between the the excitement of operating a mobile network and manifesting it into physical reality.
I had a lot of exposure to testing early stage LTE/5G networks. My motivation is to try to demystify as much of the mobile network as I can for anyone with a strong networking but non-wireless focused background.
A Mexican company that designs and sells hacker toys, security auditing tools, and educational devices. They even sell products suitable for teaching kids.
DrSchottky's fork of the Pwnagotchi firmware so that development can continue.
A wireless auditing tool implemented as a shell script that uses other tools to do the job.
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring. Map wireless networks and all clients on each network. Traffic analysis, infer device types. Send packets in response to certain conditions (such as sending 1 gig of traffic or reaching a certain traffic throughput). Deauth attacks. Saves data as YAML for analysis or sending to other software.
Written in Python 3. Installable through Pypi.
How to create a portable GSM BTS which can be used either to create a private (and vendor free!) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.
Proof of concept utilities for raw 802.11 injection.
A free utility for Windows that extracts your wireless keys in case you forget them.
A collaborative website which maps wireless access points all across the world using information donated by enterprising wardrivers.
A free ebook about deploying low cost wireless data networks in an infrastructure mode in remote locations.
Find the MAC address of nearly any wi-fi router in Google's wardriving database.
Project wiki page at freifunk.net for rigging up a wireless access point to a deep discharge battery and a solar panel.
This software allows you to stage a brute-force attack against the WPS (Wifi Protected Setup) PIN on certain wireless routers to recover WPA and WPA2 passphrases to compromise wireless access points. On average it takes about seven hours.
NoDOGsplash is a captive portal daemon which is part of the OpenWRT embedded OS for wireless access points. It forces users to click through a page of some kind before gaining access to the wireless network proper.
A website with a downloadable shell script which turns a raspi into a personal OpenVPN server. Lets you customize the configuration if you like. Appears to use a hardened OpenVPN configuration. The script will work with pretty much any Debian or Ubuntu v14.04 server you stand up someplace. The script can also be use to manage the server so you don't have to fight with the OpenVPN command lines.
A raspi appliance that implements an educational datastore for a LAN. Contains about a terabyte of data of FOSS information. Wikipedia, Project Gutenberg, and more.