4.16.2013

new place for raspenwrt project

in my previous post about raspenwrt i split the file to accept google sites (repo limitation for maximum file size). As suggest from some audience who think why not in single files....so i think it will be good to place it in sourceforge...n here it goes

2.28.2013

Raspenwrt (Raspberry pi + Openwrt)


File name: raspenwrt.img
Size:   160 MB (167,772,160 bytes)
Description: openwrt firmware for raspberry pi...it turning ur raspberry into powerfull router.
Distribution : freeware
Md5 checksum:  ab784725cfbbdc6cb525d8b764db9a76
Download link: part 1 - part 2 - part 3 - part 4 - part 5 
combine and than extract it to get the file
single linkhttps://sourceforge.net/projects/raspenwrt/




main issue:
  • Require 1000 mA or above power adapter to supply all device that connect into raspberry pi.
  • Require SD card minimum 1 GB class 6 or above, SD with class 4 it's not recomended
  • To get more space in root to install more openwrt module/app, you can resize second (mmcblkop2) partition that have ext 4 type with gparted (linux) or partition magic (windows)
  • Don't resize first partition in ur SD card (fat partition), it contain boot and mbr code...so dont change it at all  
  • Login via browser/ssh to 192.168.1.1 with username: root pass: raspberryopenwrt 
preview :

2.12.2013

Running Tor in openwrt [tp link mr 3020]

running tor in bactrack it's easy...but how about running tor in ur router, 
i might be more excited. imagine u use inet connection together but all connection being relay into tor connection...
ok... let's start our engine 

fisrt, install all required packet
 
opkg update
opkg install tor-alpha-openwrt
opkg install tor-alpha-openwrt-geoip
opkg install iptables-mod-nat-extra 
 
this sections below is part my config files:
/etc/conf/network:
config interface tor
        option ifname   "ath0"
        option proto    static
        option ipaddr   192.168.1.1
        option netmask  255.255.255.0

/etc/config/dhcp:
config dhcp tor
    option interface    tor
    option start     100
    option stop    150
    option leasetime    12h

/etc/config/firewall:
config zone
        option name     tor
        option input    REJECT
        option output   ACCEPT
        option forward  REJECT
        option syn_flood 1
        option conntrack 1

#open the port of the DHCP-Server, so that the clients get an ip
config rule                                
        option src              tor        
        option proto            udp        
        option dest_port        67         
        option target           ACCEPT     
#TOR transparent-proxy-port (set in /etc/tor/torrc)                                           
config rule                                
        option src              tor        
        option proto            tcp        
        option dest_port        9040       
        option target           ACCEPT     
#TOR DNS-proxy-port (set in /etc/tor/torrc)                                            
config rule                                
        option src              tor        
        option proto            udp        
        option dest_port        9053       
        option target           ACCEPT
 
/etc/firewall.user:
iptables -t nat -A PREROUTING -i ath0 -p udp --dport 53 -j REDIRECT 
--to-ports 9053 #redirects all DNS-requests on the interface ath0 to the 
tor-daemon-dns-proxy-port
iptables -t nat -A PREROUTING -i ath0 -p tcp --syn -j REDIRECT 
--to-ports 9040 #redirects all tcp-requests on the interface ath0 to the 
tor-daemon-transparent-proxy-port


/etc/tor/torrc:
VirtualAddrNetwork 10.192.0.0/10             
AutomapHostsOnResolve 1                                              
TransPort 9040                                                          
TransListenAddress 192.168.1.1                                          
DNSPort 9053                                                              
DNSListenAddress 192.168.1.1

/etc/conf/wireless:
config wifi-device  wifi0
    option type     atheros
    option channel  auto

    # REMOVE THIS LINE TO ENABLE WIFI:
#    option disabled 1

config wifi-iface
    option device    wifi0
    option network    tor
    option mode    ap
    option ssid    'Piratebox'
    option encryption none


1.19.2013

(basic) Activate Monitoring Network Interface in TL-MR3020

Tl-mr3020...I think it's already about three month i got this tiny things in mine. but still until now it always bring more pleasure with a lot of project can we make with this 3g wireless router. Let me see...piratebox project, DDwrt, Openwrt and don't forget bout the Minipwner.

For now i'll show u to activate monitoring network interface in tl-mr3020 base on openwrt. but try this make sure u already done with exroot.

packet u need to install first:
- wireless-tools (This package contains a collection of tools for configuring wireless
 adapters implementing the "Linux Wireless Extensions".)
- iw  (cfg80211 interface configuration utility)
- aircrack-ng (wireless penetration tools)
- mdk3 (wireless penetration tools) *optional, in this video below i just use this tool to make sure it working and not showing any error bout exist of monitor network interface (i got this message before).



greets to: just our mentor lirva32

12.30.2012

Luci Theme Minipwner Edition

File name: luci-theme-minipwner.ipk
Size:   42.5 KB (43,550 bytes)
Description:  themes for luci router management interface
Distribution : freeware
Compability: ar71xx architecture
Md5 checksum:  a07082d9fee15a4a1a1744c2081af632
Link: https://sites.google.com/site/semarak2011/dokumen/luci-theme-minipwner.ipk


Usage:
  •  ssh login to the router
  • opkg install https://sites.google.com/site/semarak2011/dokumen/luci-theme-minipwner.ipk
  • luci >> system>>language and style>>design>>minipwner


overview

 

Twitter Delicious Facebook Digg Stumbleupon Favorites More