Benutzer:Overflo/Pastebin: Unterschied zwischen den Versionen

aus Metalab, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Wechseln zu: Navigation, Suche
(Fonera)
(SOFTWARE)
Zeile 11: Zeile 11:
 
software zum flashen + packages ..
 
software zum flashen + packages ..
 
http://download.berlin.freifunk.net/fonera/
 
http://download.berlin.freifunk.net/fonera/
 +
 +
 +
 +
Buildchain
 +
http://wiki.openwrt.org/BuildingPackagesHowTo
 +
  
  
 
Repeater
 
Repeater
http://daubau.net/post/hackinglafonera
+
<pre>
 +
 
 +
#!/bin/sh
 +
 
 +
 
 +
set TARGET="deinnetz"
 +
 
 +
 
 +
killall -9 udhcpc
 +
 
 +
killall dnsmasq
 +
# flush netfilter tables
 +
iptables -F
 +
iptables -P INPUT ACCEPT
 +
iptables -P OUTPUT ACCEPT
 +
iptables -P FORWARD ACCEPT
 +
iptables -t nat -F
 +
 
 +
 
 +
# create new VAPs devices
 +
wlanconfig ath0 destroy
 +
wlanconfig ath1 destroy
 +
 
 +
 
 +
# VAP ath0 as Access Point
 +
wlanconfig ath0 create wlandev wifi0 wlanmode ap
 +
wlanconfig ath1 create wlandev wifi0 wlanmode sta nosbeacon
 +
 
 +
 
 +
 
 +
iwconfig ath1 essid $TARGET
 +
sleep 1
 +
 
 +
#externes DHCP?
 +
udhcpc -i ath1
 +
 
 +
 
 +
 
 +
iwconfig ath0 essid $TARGET
 +
ifconfig ath0 192.168.10.1 netmask 255.255.255.0 up
 +
route add default gw 192.168.1.1  // sollte man automatisieren
 +
 
 +
dnsmasq  -i ath0 --dhcp-range=192.168.10.2,192.168.10.255,1800
 +
 
 +
 
 +
 
 +
echo 1 > /proc/sys/net/ipv4/ip_forward
 +
iptables -t nat -A POSTROUTING -o ath1 -j MASQUERADE
 +
#ifconfig eth0 172.16.0.126 netmask 255.255.0.0 up
 +
#iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
 +
 
  
 +
</pre>
  
 
===HARDWARE===
 
===HARDWARE===

Version vom 1. März 2008, 15:06 Uhr

Keylogger

http://www.keelog.com/de/diy.html


Fonera

SOFTWARE

software zum flashen + packages .. http://download.berlin.freifunk.net/fonera/


Buildchain http://wiki.openwrt.org/BuildingPackagesHowTo


Repeater


#!/bin/sh


set TARGET="deinnetz" 


killall -9 udhcpc

killall dnsmasq
# flush netfilter tables
iptables -F
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -t nat -F


# create new VAPs devices
wlanconfig ath0 destroy
wlanconfig ath1 destroy


# VAP ath0 as Access Point
wlanconfig ath0 create wlandev wifi0 wlanmode ap
wlanconfig ath1 create wlandev wifi0 wlanmode sta nosbeacon 



iwconfig ath1 essid $TARGET
sleep 1

#externes DHCP?
udhcpc -i ath1



iwconfig ath0 essid $TARGET
ifconfig ath0 192.168.10.1 netmask 255.255.255.0 up
route add default gw 192.168.1.1   // sollte man automatisieren

dnsmasq  -i ath0 --dhcp-range=192.168.10.2,192.168.10.255,1800



echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o ath1 -j MASQUERADE
#ifconfig eth0 172.16.0.126 netmask 255.255.0.0 up
#iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE


HARDWARE

LCD am fonera? http://www.lefinnois.net/wpen/index.php/2007/11/11/lcd-screen-for-la-fonera/

I2C bus? http://www.lefinnois.net/wpen/index.php/2007/05/13/i2c-bus-for-la-fonera/

SD card am fonera? http://www.larsen-b.com/Article/262.html


GPIO kernel modul http://mobileaccess.de/fonera/gpio/ http://fghhgh.150m.com/