Quantcast
Channel: Hacker News 50
Viewing all articles
Browse latest Browse all 9433

Doctor Who-Style Wi-Fi With Sentient Captive Portal - tonybox

$
0
0

Comments:"Doctor Who-Style Wi-Fi With Sentient Captive Portal - tonybox"

URL:http://blog.tonybox.net/blog/2013/03/31/doctor-who-style-wi-fi-with-sentient-captive-portal/


So in this week’s episode of Doctor Who, The Bells of Saint John, the enemy is sentient and living inside of the wifi - specifically, a wifi network with a name consisting of weird symbols would appear, the target would click on it, and it would infest their computer and eventually consume their soul and consciousness into the cloud.

As you can see in the youtube video above, theres a pretty cool way to make this happen, using a Linux machine with a USB wifi card, hostapd, and a simple web server. The reason it opens up by itself on OSX is because OSX tries to automatically detect if there is a captive portal login screen, like those commonly used by coffee shops and such, and open up a web page to allow the user to log in, we’re taking advantage of that by instead loading a web page which will upload the user’s soul.

We start with the ssid, there is a helpful reddit thread where they provide a few good unicode representations of the symbols shown in the episode, I settled on using “┓┏ 凵 =╱⊿┌┬┐” for my setup.

So I hooked up a usb wifi card to my fileserver , which runs debian, and installed hostapd, dnsmasq, and nginx. (this will, of course, work well on a laptop!)

apt-get install hostapd dnsmasq nginx

Next, I modified the configuration file for hostapd, /etc/hostapd/hostapd.conf, (replacing wlan0 withe the id of your wireless card)

interface=wlan0
ssid=┓┏ 凵 =╱⊿┌┬┐
channel=7
driver=nl80211
hw_mode=g
logger_stdout=-1
logger_stdout_level=2
max_num_sta=10
wpa=0

And then configured debian to use it, by editing a line in /etc/default/hostapd

DAEMON_CONF="/etc/hostapd/hostapd.conf"

Next, dnsmasq needs to be configured, I edited the config file to give out DHCP leases, and to return the “router’s” ip for every DNS request, by editing various lines in /etc/dnsmasq/dnsmasq.conf

# ...
interface=wlan1
# ...
dhcp-range=10.1.0.50,10.1.0.200,12h
# ...
address=/#/10.1.0.1
# ...

I set up nginx to serve out pages normally, the default folder for debian is /usr/share/nginx/www, so this is a fine place to start - I put a video file clipped from the episode, upload.mp4 in that folder, and created a simple index.html

<body style="margin: 0px; background: black"><video style="width: 100%; height: 100%" autoplay loop><source src="upload.mp4" type="video/mp4"></video></body>

Next, time to start everything up

/etc/init.d/hostapd start
ifconfig wlan0 10.1.0.1
/etc/init.d/nginx start
/etc/init.d/dnsmasq start

And, finally, forward all traffic to the right IP in the style of the classic upside down ternet

iptables -t nat -A PREROUTING -s 10.1.0.1/24 -p tcp -j DNAT --to-destination 10.1.0.1

And the end result is shown in the video above!


Viewing all articles
Browse latest Browse all 9433

Trending Articles