Skip to content

4. Applications

Elizabeth Esparza edited this page Dec 13, 2024 · 9 revisions

First Steps

You must first turn ON Minino, to then navigate using the buttons on the board. If the display does not show ups anything, press the reset button.

Resetting Minino (left)               Navigating through the interface (right)

Wi-Fi

Analyzer

Capture the Wi-Fi packets being sent in the nearby networks to then save them in the SD cards or internally and visualize them. The saved data shows data such as data length, SSID, channel, destination, source, and more.

Note

For a better understanding of .pcap files generated by the Analyzer, refer the following guide.

Deauth

Deauthenticator has different phases.

  1. Minino will scan for nearby networks (Access Points).
  2. The scanned networks will appear in a list. Select one to work with.
  3. When a network is selected, information about it will be displayed (RSSI, Primary Channel, BSSID, and Authentication Mode).
  4. Now it is time to select the attack. The available attacks are:
    • Broadcast: deauthentication attack is a type of denial-of-service attack interfering with communication between routers and devices. It exploits IEEE 802.11 wireless networks, as they have the necessary deauthentication frames. Networks use them to end connections or, in other words, disconnect users.
    • Rogue AP: A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator.
    • Combine
    • Multi-AP
    • Captive Portal: The attack attempts to retrieve the target access point’s WPA/WPA2 key by means of a rogue network with a border authentication captive portal. You can find more information on FluxionNetwork/fluxion/wiki/Captive-Portal-Attack

DoS

A denial of service (DoS) attack is an attempt to overload a website with the aim of degrading its performance or even making it completely inaccessible.

To use this application, it is necessary to configure your Minino through the Minino Console. For DoS, you need to configure the WiFi AP, web server target and then use the catdos command to start the attack from the console.

DoS Help Menu

When you type help in the console after launching the DoS application, you will see the help menu, which includes two additional options: webconfig and catdos.

The webconfig command is used to configure the web target. It will prompt you for the following details:

Settings Description
host IP address of the target
port Port of the target.
endpoint Endpoint of the target.

Once the target is configured, use the catdos command to launch the DoS attack.

Bluetooth

Trackers scan

Identify the near BLE and tracker devices. It is useful to find lost things or determine if you are being tracked.

SPAM

Emulate different BLE devices to SPAM a central device with notifications (if compatible).

HID

A Bluetooth HID device is a device providing the service of human or other data input and output to and from a Bluetooth HID Host. Bluetooth HID Device APIs can be used to make devices like keyboards, mice, joysticks and so on.

Allows you to connect the Minino to another device via Bluetooth. Once you select the HID application, you will see the device name and MAC to identify the Minino and connect it to a device.

When the Minino is paired to a device, it will show a menu to control the volume and play or pause any media is being reproduced.

ADV Scanner

Scans the beacon advertising allowing the user to filter pasively or actively the advertising packets as following:

Filter Accepted packages
All Accept all except directed advertising packets not addressed to the device (default).
Only WLST Only advertisement packets from devices where the advertiser’s address is in the White list and packets which are not addressed for this device shall be ignored.
UND RPA Undirected packets, directed advertising packets where the initiator address is a resolvable private address, and directed advertising packets addressed to this device
WLST & RPA Packets from devices where the advertiser’s address is in the White list, and directed packets where the initiator address is a resolvable private address, and directed packets addressed to this device.

Displayed Information:

  • Advertising Type: Shows the type of advertising packets detected.
  • RSSI: Displays the signal strength of the advertising packets.

The captured data in the Minino is displayed as shown in the image below:

To dive deeper into the scanned packets, use Wireshark and pycatsniffer. These tools allow detailed analysis of BLE advertising data.

Note

You must first set up pycatsniffer and Wireshark to perform the below steps: pycatsniffer_bv3/docs/CatSniffer - Tool - ZigBee Workshop.md

Steps to use pycatsniffer.py:

  1. Run the following command to start BLE sniffing: python pycatsniffer.py bsniff COMx -phy 0 -ch 37 -ff -ws

    • Replace COMx with your device's COM port.
    • -phy and -ch specify the channel and protocol settings.
    • -ff enables FIFO mode.
    • -ws opens the output in Wireshark.

Note

Bluetooth Low Energy (BLE) advertising channels are a way for BLE devices to communicate with other devices without a connection. The three primary advertising channels are channels 37, 38, and 39:

  • Channel 37: Operates in the range of 2402–2480 MHz
  • Channel 38: Operates in the range of 2404–2480 MHz
  • Channel 39: Operates in the range of 2406–2480 MHz
  1. Ensure the CatSniffer dissectors are set up in Wireshark for proper packet interpretation.

  2. Once running, you’ll see an output similar to this:

On the left, the terminal window shows the output from the pycatsniffer script. While, on the right, the Wireshark application displays the captured data from the Minino device.

Zigbee

Spoofing

Emulate a Zigbee device. Zigbee devices are battery-powered IoT devices. Minino will create a network and emulate either a switch or a light.

Sniffer

Read the packets sent in a Zigbee network. This feature is only available if Minino is connected to a computer to watch the data on a serial monitor.

You may encounter that Minino indicates you need pycatsniffer to display the Zigbee sniffed data. You can learn how to do this by going to: pycatsniffer_bv3/docs/CatSniffer - Tool - ZigBee Workshop.md

Thread

Minino can send messages to all devices on the network channels simultaneously, broadcasting alerts or synchronizing devices.

Matter

This feature is still in development :)

GPS

Get your current location as Latitude, Longitude and Alt data. Set the date and time data for other applications.

Important

Place yourself or Minino in a sky open area or near to a window for better GPS signal reception.

Wardriving

Find Wi-Fi signals in a particular area and save them with their GPS location data. The objective is to identify vulnerable Wi-Fi networks that can be exploited. From moving vehicles (the ‘driving’ part of wardriving), attempt to locate vulnerable networks for later potential use in attacks (the ‘war’ part of wardriving). Once found, submit the information to third-party websites and apps to create digital maps.

Scanning

  1. Set up the time zone in Settings > System > Time zone
  2. Verify the date and time in Applications > GPS > Date & Time
  3. Insert a microSD in Minino
  4. Start the networks scanning in Applications > GPS > Wardrive > Start

  1. Stop the scanning when desire by returning to the wardriving main menu

Visualization

Once scanned, we can visualize the obtained data by doing the following:

  1. Copy the Wardriving data file by taking off the microSD or using the File Manager feature.
  2. Upload the files to https://wigle.net/. Go to tab Uploads for uploading the file.

Note

Registrating to wigle.net is recommended.

  1. One uploaded, wigle.net will convert the data. You can check the status in the Uploads section.

  1. You can visualize the information in Wigle.net or import it to any other service as Google Earth.

  1. In Google Earth the data from the file will be displayed on the left side of the screen and selecting any of the saved Wi-Fi AP will prompt a new window with more information.

Date and Time

Get the date and time using the GPS signal.

Note

You must set the correct time zone for accurate data.

Location

Get your current location.

Speed

Measure the movement speed based on the GPS readings.

File Manager

Minino has a microSD slot which is useful for saving data from the apps. Taking in and out the microSD may cause loss the memory or damage, so here is where the File Manager feature solves the problem by adding the option of saving data by mounting the flash file system and by creating an access point through WiFi you can access the microSD content in your web browser and download the data from it.

Local

When the "Local" option is selected, Minino displays the message "Mounting flash file system" and then shows the options for "Internal" storage and "SD Card" (if available).

Web

  1. Once selected the Web option, Minino will display the AP(Access Point) name and password.

  1. Connect to the AP with your device.
  2. Once connected, open a new web browser tab and go to 192.168.0.1
  3. To download a file, navigate to the directory where the file is located and click on it. The download will begin automatically.

Analysis of .pcap files with Minino

Note

This information and script are sourced from MrR0b0t19's easy-minino repository. For additional details or documentation in Spanish, please visit the repository.

The .pcap file that Minino generates contains network packets captured during the scan, and this script will help you interpret that data, even if you have no previous experience in network analysis.

What is a .pcap file?

A .pcap (Packet Capture) file is a format that stores data packets traveling through a network. This information is very useful for analyzing communication between devices, identifying network problems, or simply observing traffic.

Instructions for analyzing the .pcap file with Wireshark

  1. Capture network traffic with Minino: Run Minino. This will generate a .pcap file with all captured packets.

  2. Open the .pcap file in Wireshark:

    • Start Wireshark and open the .pcap file.
    • In Wireshark, you will see a detailed list of all network packets.
    • this is the normal and the generic case

Example of the result

Below is what the results of the .pcap file would look like in Wireshark. In this image, you can see a list of captured packets, with details such as the IP address, the protocol used and the ports involved.

Instructions for analyzing the .pcap file with Easy-minino Script

Use the script to facilitate interpretation: If you do not want to or do not know how to analyze each package manually, you can use the script created by @MrR0b0t19 to extract relevant information and present it in a more user-friendly way.

Requirements

Before starting, you must already have the file downloaded, then in your terminal install “scapy” using pip install scapy.

  1. Capture network traffic with Minino: Run Minino. This will generate a .pcap file with all captured packets.

  2. Instructions for using the script:

    • Run the script in your development environment or in Kali.
    • Provide the .pcap file as input to the script. The script will process the file and show you an easy-to-understand summary.

Example of the result

Interpretation of the results:

  • Packet type: shows you the type of packet beacon/probe response/data/etc.
  • SSID: The name of the AP.
  • MAC address: Each device has a unique MAC address that is used to identify it on the network.
  • Channel: Communication channel where the network is located.