Jump to content

skynetbbs

Active Members
  • Posts

    33
  • Joined

  • Last visited

Recent Profile Visitors

906 profile views

skynetbbs's Achievements

Newbie

Newbie (1/14)

  1. the shipping is free at the moment...I don't think the price will drop ... you probably missed the ThanksGiving/Black Friday price as well? and what do you wanna hack? it has allready open SSH ports... you can compile & change the sourcecode... you can create "plugins" and offer it to other fonera 2.0g/n users to install them like "applications" you can create small plugins that run on flash/ram you can create large plugins that run as an image on eg an usb stick, like the torrent plugin the only limiting factor is that the Ralink drivers are "binary"... so no hacking of the "wifi"-drivers... but you can still add wireless functionality... last week Wireless repeater and wan-Lan bridge was added
  2. Not impossible linux/openwrt wise... but do you know of any Atheros based usb sticks that could be found/bought/used ?
  3. Openwrt is not the problem...it's running a 8.09 with Luci and a linux kernel 2.6.21 the problem is it's running Ralink and not an Atheros... Jasager uses a special version of "MadWifi" which is only made to support Atheros... (http://madwifi-project.org/wiki/About/MadWifi) the Ralink drivers are "closed source",binary, statically linked...which explains why the linux kernel is older than eg the Fonera 2.0g (2.6.26.2) I don't have the impression that the http://rt2x00.serialmonkey.com/wiki/index.php/Main_Page project is at the same height yet as MadWifi. Nor that it supports the Ralink soc yet that is used on the Fonera 2.0n So I don't think one can replace the ra_wifi,ra_switch,... drivers yet by patched versions? But you can install all these nice packages on it to give you a feature rich router: http://downloads.openwrt.org/kamikaze/8.09...rb532/packages/ (except the Kmod_ which are probably compiled for linux kernel 2.6.23 instead of 2.6.21) the kmod's can be compiled with the Fonosfera SDK.... no need for a 64bit compile machine or knowledge about cross compiling...
  4. * enable dhcp on your laptop/desktop whatever... so your device get's an ip in the 192.168.10.x range.... * are you sure you are "connected", perhaps you made a typing mistake when it asked for your wpa password? * Perhaps you didn't read the "wait for ... minutes to let the router autoupdate" and it was rebooting when you tried with the new firmware?
  5. why? svn co http://svn.fonosfera.org/fon-ng/trunk fon-ng it contains all ralink drivers differences between fon2.0g -> fon2.0n * 4 network ports * "stable" usb port (1.x & 2.x usb without the need for a 2.0 usb hub) * wifi-n : better wifi range possible even at "g" speeds * better cpu (400mhz instead of 182mhz) -> data throughput was bottlenecked due to this to 1Mbit... now it can have 8Mbit
  6. Between 26-30th june the 2nd Hacker Space Festival takes place in Paris The canceled speech from last year about HostileWrt is being done THIS TIME... http://hsf.wikidot.com/hostilewrt Hacker Space Festival 2009 » Conferences » HostileWRT: Turn Your Friendly Wireless Access Point into an Autonomous, Curious, Standalone, Malicious & Really Annoying Device * Title: HostileWRT: turn your friendly wireless access point into an autonomous, curious, standalone, malicious & really annoying device * Speakers: Itzhack & Mr. Parkinson * Language: English * Keywords: embedded, wireless, wep cracking, vuln scanning, captive portal evasion, internet sharing, unvoluntary mesh network, accidental associations Have you ever imagined what a recalcitrant access point would look like? Well… neither do we. So we're going to show you what REAL love is all about. HostileWRT tends to make love to your antennas thanks to the 802.11 protocol suite. Then, sharing the love is more than natural. No wonder then that HostileWRT, despite its very "blackhat" touch, is the most desirable item in one's sado-(techno)-masochist outfit.
  7. that site crashes my Firefox :-) btw Fonera 2.0 uses "Cambozola" for streaming webcam functionality... no idea on the impact with eg 5 webcams attached... I only have one :-)
  8. you can get inspiration on : http://www.societyofrobots.com/member_tutorials/node/25
  9. just forwarding video/audio is nothing but there is no Floating Point Unit present to do any complex actions on this traffic using unused "gpio" on the pcb of La Fonera Classic and a "network" enabled webcam there have been allready many "mobile" foneras controlled via pocketpc or playstation portable (wifi) so the usb version would make it easier to add usb controlled turrets; webcams; ...
  10. no need for ITX based linux system... La Fonera 2.0 is running linux and you can compile any C source for it ...there are over 3000 plugins for it available operate your webcams; it should be able to handle your turrents & driving if you have the proper drivers for it :-)
  11. You can use a fonera 2 with it's latest openwrt/fon firmware; the usb port; an active powered usb hub for a webcam & the missile launcher? eg : http://skypejournal.com/blog/2007/12/endos...r_the_smal.html you want to see the target? or you want to see where you are driving? or you want to see both? :-)
  12. freewlan has the QRM method to "repeat" open/closed accesspoints Francofon uses the ponte2 system ... http://www.blogin.it DD-Wrt also took over the ponte2 system... the benefit of this it's universal... WDS is very "chipset" specific...eg WDS only work if you're only using atheros or only using broadcom but what chipset does the all-in-one wifimodem use of your ISP?
  13. story about someone that did it in Austin, Texas : http://elfonblog.fondoo.net/?p=120 retailers : http://retail.spread-fon.com/ (but it's fairly europe iniative this website) For your part of the world it might be best to talk to the fonhk.com headquarters instead of those in Spain: http://www.fonhk.com/
  14. there is just no australian business partner interested in importing them and distributing them on the aussie market :-) but check maps.fon.Com and go check the inactive ones... perhaps they want to give theirs to you?
  15. no the only thing that has been proven here is the fact that WiFi should NOT be used anymore but 3G is secure (hence it's not open) I agree that this project makes "hidden ssid' and 'mac whitelisting' not serious...but imho they never were in the first place; the first makes every pc "broadcast' your ssid; and the second...every modern wifi driver allows you to change your mac adres... this was proven a long while ago... if people want to use security...then they should just use a vpn client on their laptop with a certificate that connects thru the "alien" fonspot over the internet directly to your fonspot at home using SSH.... hence you're using a certificate should make it impossible to use man in the middle?
×
×
  • Create New...