-
Notifications
You must be signed in to change notification settings - Fork 6
4. Applications
You must first turn ON Minino, to then navigate using the buttons on the board. If the display does not show ups anything, press the reset button.
Resetting Minino (left) Navigating through the interface (right)
Capture the Wi-Fi packets being sent in the nearby networks to then save them in the SD cards or internally and visualize them. The saved data shows data such as data length, SSID, channel, destination, source, and more.
Note
For a better understanding of .pcap files generated by the Analyzer, refer the following guide.
Deauthenticator has different phases.
- Minino will scan for nearby networks (Access Points).
- The scanned networks will appear in a list. Select one to work with.
- When a network is selected, information about it will be displayed (RSSI, Primary Channel, BSSID, and Authentication Mode).
- Now it is time to select the attack. The available attacks are:
- Broadcast: deauthentication attack is a type of denial-of-service attack interfering with communication between routers and devices. It exploits IEEE 802.11 wireless networks, as they have the necessary deauthentication frames. Networks use them to end connections or, in other words, disconnect users.
- Rogue AP: A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator.
- Combine
- Multi-AP
- Captive Portal: The attack attempts to retrieve the target access point’s WPA/WPA2 key by means of a rogue network with a border authentication captive portal. You can find more information on FluxionNetwork/fluxion/wiki/Captive-Portal-Attack
A denial of service (DoS) attack is an attempt to overload a website with the aim of degrading its performance or even making it completely inaccessible.
To use this application, it is necessary to configure your Minino through the Minino Console. For DoS, you need to configure the WiFi AP, web server target and then use the catdos
command to start the attack from the console.
When you type help
in the console after launching the DoS application, you will see the help menu, which includes two additional options: webconfig
and catdos
.
The webconfig
command is used to configure the web target. It will prompt you for the following details:
Settings | Description |
---|---|
host | IP address of the target |
port | Port of the target. |
endpoint | Endpoint of the target. |
Once the target is configured, use the catdos
command to launch the DoS attack.
Identify the near BLE and tracker devices. It is useful to find lost things or determine if you are being tracked.
Emulate different BLE devices to SPAM a central device with notifications (if compatible).
A Bluetooth HID device is a device providing the service of human or other data input and output to and from a Bluetooth HID Host. Bluetooth HID Device APIs can be used to make devices like keyboards, mice, joysticks and so on.
Allows you to connect the Minino to another device via Bluetooth. Once you select the HID application, you will see the device name and MAC to identify the Minino and connect it to a device.
When the Minino is paired to a device, it will show a menu to control the volume and play or pause any media is being reproduced.
Scans the beacon advertising allowing the user to filter pasively or actively the advertising packets as following:
Filter | Accepted packages |
---|---|
All | Accept all except directed advertising packets not addressed to the device (default). |
Only WLST | Only advertisement packets from devices where the advertiser’s address is in the White list and packets which are not addressed for this device shall be ignored. |
UND RPA | Undirected packets, directed advertising packets where the initiator address is a resolvable private address, and directed advertising packets addressed to this device |
WLST & RPA | Packets from devices where the advertiser’s address is in the White list, and directed packets where the initiator address is a resolvable private address, and directed packets addressed to this device. |
Displayed Information:
- Advertising Type: Shows the type of advertising packets detected.
- RSSI: Displays the signal strength of the advertising packets.
The captured data in the Minino is displayed as shown in the image below:
To dive deeper into the scanned packets, use Wireshark and pycatsniffer. These tools allow detailed analysis of BLE advertising data.
Note
You must first set up pycatsniffer and Wireshark to perform the below steps: pycatsniffer_bv3/docs/CatSniffer - Tool - ZigBee Workshop.md
-
Run the following command to start BLE sniffing:
python pycatsniffer.py bsniff COMx -phy 0 -ch 37 -ff -ws
- Replace
COMx
with your device's COM port. -
-phy
and-ch
specify the channel and protocol settings. -
-ff
enables FIFO mode. -
-ws
opens the output in Wireshark.
- Replace
Note
Bluetooth Low Energy (BLE) advertising channels are a way for BLE devices to communicate with other devices without a connection. The three primary advertising channels are channels 37, 38, and 39:
- Channel 37: Operates in the range of 2402–2480 MHz
- Channel 38: Operates in the range of 2404–2480 MHz
- Channel 39: Operates in the range of 2406–2480 MHz
-
Ensure the CatSniffer dissectors are set up in Wireshark for proper packet interpretation.
-
Once running, you’ll see an output similar to this:
On the left, the terminal window shows the output from the pycatsniffer
script. While, on the right, the Wireshark application displays the captured data from the Minino device.
Emulate a Zigbee device. Zigbee devices are battery-powered IoT devices. Minino will create a network and emulate either a switch or a light.
Read the packets sent in a Zigbee network. This feature is only available if Minino is connected to a computer to watch the data on a serial monitor.
You may encounter that Minino indicates you need pycatsniffer to display the Zigbee sniffed data. You can learn how to do this by going to: pycatsniffer_bv3/docs/CatSniffer - Tool - ZigBee Workshop.md
Minino can send messages to all devices on the network channels simultaneously, broadcasting alerts or synchronizing devices.
This feature is still in development :)
Get your current location as Latitude, Longitude and Alt data. Set the date and time data for other applications.
Important
Place yourself or Minino in a sky open area or near to a window for better GPS signal reception.
Find Wi-Fi signals in a particular area and save them with their GPS location data. The objective is to identify vulnerable Wi-Fi networks that can be exploited. From moving vehicles (the ‘driving’ part of wardriving), attempt to locate vulnerable networks for later potential use in attacks (the ‘war’ part of wardriving). Once found, submit the information to third-party websites and apps to create digital maps.
- Set up the time zone in Settings > System > Time zone
- Verify the date and time in Applications > GPS > Date & Time
- Insert a microSD in Minino
- Start the networks scanning in Applications > GPS > Wardrive > Start
- Stop the scanning when desire by returning to the wardriving main menu
Once scanned, we can visualize the obtained data by doing the following:
- Copy the Wardriving data file by taking off the microSD or using the File Manager feature.
- Upload the files to https://wigle.net/. Go to tab Uploads for uploading the file.
Note
Registrating to wigle.net is recommended.
- One uploaded, wigle.net will convert the data. You can check the status in the Uploads section.
- You can visualize the information in Wigle.net or import it to any other service as Google Earth.
- In Google Earth the data from the file will be displayed on the left side of the screen and selecting any of the saved Wi-Fi AP will prompt a new window with more information.
Get the date and time using the GPS signal.
Note
You must set the correct time zone for accurate data.
Get your current location.
Measure the movement speed based on the GPS readings.
Minino has a microSD slot which is useful for saving data from the apps. Taking in and out the microSD may cause loss the memory or damage, so here is where the File Manager feature solves the problem by adding the option of saving data by mounting the flash file system and by creating an access point through WiFi you can access the microSD content in your web browser and download the data from it.
When the "Local" option is selected, Minino displays the message "Mounting flash file system" and then shows the options for "Internal" storage and "SD Card" (if available).
- Once selected the Web option, Minino will display the AP(Access Point) name and password.
- Connect to the AP with your device.
- Once connected, open a new web browser tab and go to 192.168.0.1
- To download a file, navigate to the directory where the file is located and click on it. The download will begin automatically.
Note
This information and script are sourced from MrR0b0t19's easy-minino repository. For additional details or documentation in Spanish, please visit the repository.
The .pcap file that Minino generates contains network packets captured during the scan, and this script will help you interpret that data, even if you have no previous experience in network analysis.
A .pcap (Packet Capture) file is a format that stores data packets traveling through a network. This information is very useful for analyzing communication between devices, identifying network problems, or simply observing traffic.
-
Capture network traffic with Minino: Run Minino. This will generate a .pcap file with all captured packets.
-
Open the .pcap file in Wireshark:
- Start Wireshark and open the .pcap file.
- In Wireshark, you will see a detailed list of all network packets.
- this is the normal and the generic case
Below is what the results of the .pcap file would look like in Wireshark. In this image, you can see a list of captured packets, with details such as the IP address, the protocol used and the ports involved.
Use the script to facilitate interpretation: If you do not want to or do not know how to analyze each package manually, you can use the script created by @MrR0b0t19 to extract relevant information and present it in a more user-friendly way.
Before starting, you must already have the file downloaded, then in your terminal install “scapy” using pip install scapy
.
-
Capture network traffic with Minino: Run Minino. This will generate a .pcap file with all captured packets.
-
Instructions for using the script:
- Run the script in your development environment or in Kali.
- Provide the .pcap file as input to the script. The script will process the file and show you an easy-to-understand summary.
Interpretation of the results:
- Packet type: shows you the type of packet beacon/probe response/data/etc.
- SSID: The name of the AP.
- MAC address: Each device has a unique MAC address that is used to identify it on the network.
- Channel: Communication channel where the network is located.
Thank you for reading our Wiki!