The TP-Link WR703N is a quite amazing and affordable piece of hardware and has received a lot of love from the hacking community. Once you take a look at the price tag and feature set you quickly notice why it’s so well received: it crosses the counter for just 25 EUR on Amazon or as low as 16 EUR if you look abroad! It’s been used as a pentesting aid, made even more hacker friendly, got turned into a webradio player, and made more awesome by adding a display.
So you think all that can be done has already been done. But no: shackspace hackers makefu and exco came up with another idea. And that idea was followed by another, and another, and they simply kept going. The project is called minikrebs and is part of the bigger experimental coding platform krebscode.
Here’s what they came up with so far.
NFC / RFID Login Terminal
The NFC-Gate is part of the User Suppository (sic) infrastructure. It polls the attached NFC-connector for new cards and uses the UID of the card for trying to either log in or log out the user at the shack-infrastructure.
The NFC-gate is a build for the MR3020, not the WR703 as it uses all the available LEDs to display the status of the login. The NFC-Reader used is the SCM SCL3711 as it is supported pretty well by libnfc and is quite small.
For more information check out the Github repository and the source code of this profile.
Instacam: Automatic Webcam Streaming
The aim of this little project is to reliably push a video stream directly out to the internets for everyone to see at a very low price.
It combines a webcam (could be a cheap China model or one of Logitech’s HD cams, as long as its supported by uvc or Gspca) with a TP-Link 703N. It automatically boots up and starts streaming. Use a battery pack and USB 3G stick for field connectivity. Drop to deploy!
This project is already in use in two places at shackspace. One is built into our lasercutter to allow safe monitoring and recordings of the cutting process. The AP can manage multiple clients at the same time and even stream HD video at acceptable frame rates.
The purpose of the profile is to create an access point where every connection is rewritten to instead deliver a rick-roll. If you carry it with you when riding the train (remembert to get a battery pack!) you will have great fun giggling each time the LED blinks indicating another victim was served a piece of the 80’s.
Having videos autostart on a victim’s mobile brower is quite difficult and unreliable, so instead of an actual video, a short animated GIF with Rick dancing plus the first minute of its famous song will be served by the httpd.
Laptops and other clients with phat-browsers will probably honor both autostart loop tags in the new HTML5 standard.
Forwarding USB Interfaces over WiFi using USB/IP
In this configuration minikrebs will start up as USB-bridge with the USB/IP-stack. It will run usbipd and grab an IP-address via DHCP from the LAN interface.
Krebs Integration and Heckenkrebs
Of course minikrebs integrates seamlessly into the pile of code called krebscode/painload.
The krebs base profile for krebs nodes includes all the core feature to automatically connect to the retiolum darknet.
Adding Heckenkrebs functionality will give you an automatic internet-establish and gateway provider for the retiolum darknet (or any darknet that you want to set up). The Heckenkrebs will use a patched aap tool to connect randomly to wireless networks which are „unprotected in some ways“, meaning that it can also do slightly more advanced stuff like calculating default keys for EasyBox home-routers which are quite common in Germany (in case you forgot your default key that is). It also provides a blacklist feature and access-point password list for known networks.
- makefu on twitter
- exco on twitter
- krebscode/painload on GitHub
- Project minikrebs documentation on the shackspace wiki