{"id":123,"date":"2016-08-24T09:50:43","date_gmt":"2016-08-24T06:50:43","guid":{"rendered":"http:\/\/192.168.10.2\/?p=123"},"modified":"2023-05-11T21:44:31","modified_gmt":"2023-05-11T18:44:31","slug":"wireless-pentest-in-my-pocket","status":"publish","type":"post","link":"http:\/\/192.168.10.2\/wireless-pentest-in-my-pocket\/","title":{"rendered":"Wireless pentest in my pocket"},"content":{"rendered":"
Some may know that I really enjoy working on wireless security. However, pentesting tools for wireless systems usually are not so mobile as it should be.<\/p>\n
Before going into details I would like to remind that, although WiFi (802.11) works on ISM band and it is perfectly legal to use these frequency under your country’s regulations, it is not so ethic to perform any penetration test or intrusion to anyone without their permission.<\/p>\n
In the past I was using the below Raspberry Pi2 with an attached WiFi dongle in the same case. Also, in order to power it up, I was using a 7000MAh Sony power bank. The result was something you do not want to carry on your pocket. Yet, with a single WiFi dongle, it was not possible to work on 3 non-overlapping WiFi channels (1,6, and 11) without hoping. This was especially a problem when the startup script was set to a specific channel while you want to work on another. Whenever this happens, I had to pull out the usb memory out from Raspberry Pi and plug it into my phone (OTG) and edit the startup script.<\/p>\n