Skip to content

maxxsyntax/Pages

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

A Novel Approach to 802.11 Probe Request Analysis, Part V

Hello All, It's been a while since my last post, A Novel Approach to 802.11 Probe Request Analysis, Part IV

Since then, I've standardized on the Raspberry Pi Zero W2 with a USBHat as a platform, Got Blue2thprinting up and running, switched to mysql instead of sqlite and gave a talk, which can be found here.

Some interesting findings, to avoid more threat actors, I've decided not to enumerate them, publicly at at least, and switched focus to the PII and PII fragments which could be used for seeds for OSINT pivots. Also, by examining sequence numbers I've found, SSID Bursts, aka probing rounds, hop channels in the middle of a burst. In order to get a full picture of how probing works, one must monitor all (most) wifi channels. This means multiple raspberry pi's with usb hat's all talking to a central mysql server.

I got this up and running but it turns out tshark can hog resources. I tried a python alternative but found that it maxes out the CPU and cranks the heat up. Pi Zero's start throttling cpu at 80 degrees C. I'm also wondering if SDcard write speed is an issue, So I'm in the process of upgrading those.

You can follow allow with the project here.

That's it for now. I'll provide an update when there's something interesting to share.

Releases

No releases published

Packages

No packages published