You can find the talk materials and slides right here.
My latest mini-project involves deauth attacks of a portable nature. I give you, the Wifi Grenade. Just be warned, this talk is juvenile, script-kiddieish, and probably irresponsible. In this post, I'll show you how to build it.
To cover myself, I have to warn you of some things:
First, go shopping, you'll need some things (Amazon referral links below).
[$6] 8GB Micro SD Card
[$40] Anker 16000mah Battery
When you have all of your gear, let's get the OS installed:
I'm using Arch Linux ARM for my Pi, follow the instructions
get the base OS installed, then run your updates with
pacman -S scapy iw wireless_tools git to pull the required
tools and libraries.
git clone https://github.com/DanMcInerney/wifijammer
Next, we have to set an auto-login. Create
/firstname.lastname@example.org/override.conf with the
[Service] ExecStart= ExecStart=-/sbin/agetty --autologin root --noclear %I 38400 linux
Next, we have to set the jammer to run on boot. The simplest way to do
this is with
.bashrc, modify the contents with the following:
exec /usr/bin/python2 /root/wifijammer/wifijammer.py -a 11:22:33:44:55:66
Now your system will boot directly into the root user and start the wifi
jammer. By default, the jammer is set to only jam 11:22:33:44:55:66.
Modify this script to specify which network you would like to jam.
-a, wifijammer.py will jam any and all networks it comes
across, be careful and only attack networks you are legally allowed to.