TAKO. INTERNET SEIT 1996.
Olympus-OM

Re: [OM] OT: Wifi Hackers

Subject: Re: [OM] OT: Wifi Hackers
From: David Thatcher <plusphoto@xxxxxxxxxx>
Date: Sat, 3 Feb 2018 12:43:33 +1030
On Fri, Feb 02, 2018 at 06:17:08PM +0000, Mike Bloor wrote:
> The box pointed out by Steve is interesting. I have a Raspberry Pi 3 
> (with HiFiBerry DAC+ Pro) in my living room as a Squeezebox player. 
> The WiFi reception on it is really poor though. I have tried the 
> in-built WiFi, a USB dongle and a USB dongle with external aerial - 
> all without success. I'm looking for some king of bridge that would 
> pick up the signal from my Netgear access point and route it over Cat 
> 5 cable into the Raspberry's wired Ethernet socket. Perhaps the 
> Ravpower would work.

Most devices with a 'client bridge' feature would do what you want,
you'd need to review the manual to see if the feature is available.

e.g. I had a couple of TP-Link TL-WR702N nano hotspots (AUD$20) set up
in 'client mode' for this purpose in an outbuilding - and worked exactly
as you describe with the RPi2. See section 2.3.5 of this pdf for the
setup that was used here:
http://static.tp-link.com/res/down/doc/TL-WR702N_V1_UG.pdf 

Note these are now obsolete, don't work with a non-broadcast SSID, and
given the age of the non-US-region code are likely subject to the WPA
vulnerabilities reported last October, but I's sure there will be
something more current and likely as inexpensive.  I retired the TP-link
hotspots when I installed a Cisco AP, and my really old d-link AP (which
did not have client bridge mode), is now running the open-source DD-WRT
(which does)  and doing this same duty for multiple devices.


hope this is of use!
davidt

PS If anyone is interested the WPA vulnerabilities (which have existed
for something like 15 years) are listed here. Don't panic, most software
vendors have released patches, and if you do your automagic updates,
they'll already be installed.

CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13086 
CVE-2017-13087
CVE-2017-13088

-- 
_________________________________________________________________
Options: http://lists.thomasclausen.net/mailman/listinfo/olympus
Archives: http://lists.thomasclausen.net/mailman/private/olympus/
Themed Olympus Photo Exhibition: http://www.tope.nl/

<Prev in Thread] Current Thread [Next in Thread>