Discussion:
Dig the FCC database script + Minitar AP
Henrion Benjamin
2003-11-03 17:48:54 UTC
Permalink
Hello,

I propose to write a script in python (pycurl and other modules) to
mirror and to detect new possible hackable access points.

The problem we are facing now is that I feel that every manufacturer is
changing their lines with new models, and it will be difficult (again!)
to find samsung4510 APs.

So, I've watched some pdf of the FCC (most of them doesn't respect the
pdf standard), and I remember to have seen some aps based on the Realtek
SOC 8181 (200mhz mips).

There's one AP running linux on this SOC here:

http://melbourne.wireless.org.au/wiki/?minitar

It could be useful to start other hacking sessions on those boards too.

You can note that the new Dlink900ap+revC and DlinkDI614+revB are based
on the arm9 conexant cpu with minipci TI chip. Theres's JTAG, but no
driver for the TI chip (not acx100).
--
Benjamin Henrion <***@udev.org>
http://bh.udev.org
Loading...