Wi-Fi Jamming Using Raspberry Pi: ISSN: 1314-3395 (On-Line Version) Url: Http://acadpubl - Eu/hub Special Issue
Wi-Fi Jamming Using Raspberry Pi: ISSN: 1314-3395 (On-Line Version) Url: Http://acadpubl - Eu/hub Special Issue
1
Chithambarathanu.M , 2Chellappa.K, 3DeepanVijay.V
1
Assistant Professor, 2,3UG Scholar
1,2,3
Department of Computer Science of Engineering,
Rajalakshmi Engineering College, Thandalam, Chennai, Tamilnadu, India.
1
chithambarathanu.m@rajalakshmi.edu.in,2kannabiranchellappa@gmail.com,
3
deepanvijayv@gmail.com.
Abstract: The idea of this project is to turn a sensed or controlled remotely across existing network
Raspberry Pi2 into a Wireless network attack tool. This infrastructure, creating opportunities for more direct
continuously jam all Wi-Fi clients and access points integration of the physical world into computer-based
within range. To jam the network this first identifies systems, and resulting in improved efficiency, accuracy
the most powerful wireless interface and starts to and economic benefit in addition to reduced human
identify the access points (APs) and the clients intervention. Experts estimate that the IOT will consist
connected to those APs by sequential hopping of of about 30 billion objects by 2020. It is also estimated
channels. The network gets intervened by sending that the global market value of IOT will reach $7.1
deauth packets to clients for targeted jamming. This trillion by 2020.
can also be the access point's MAC so all clients
associated with that AP would be deauthenticated and 2. Block Diagram of Raspberry Pi
effective access point saturation can be achieved. The
Raspberry Pi is an open hardware, the system on a chip
(SoC) runs many of the main components of the board–
CPU, graphics, memory, the USB controller etc. The
raspberry pi projects are open and can be modified.
1. Introduction
871
International Journal of Pure and Applied Mathematics Special Issue
• Law Enforcements: Jamming devices were originally Download an ip scanner like ‘Angry ip scanner' to
developed for law enforcement and the military to identify the ip address of the pi board. In the ip scanner
interrupt communications by criminals and terrorists. enter the range of ip address for it to scan
• This can be used in any hostage situations to prevent (Eg:192.167.132.1 to 192.167.132.255).After
communications of terrorists and protection against identifying the ip address of the pi board, download
bomb blasts using open wireless networks can be done. vnc viewer. Enter the ip address in vnc viewer and
• Institutions can use this jammer to control the access the pi board. The raspberry pi has a dedicated
devices that connect to their wireless network. memory slot. Insert a memory card in the pi board
containing the raspberrian operating system and the
4. Architecture Diagrams needed python code.
872
International Journal of Pure and Applied Mathematics Special Issue
that the 1sec per channel time limit is eliminated and MAC here to target that one client and any other
channels are hopped as soon as the deauth packets devices that communicate with it.
finish sending. Note that it will still add clients and
APs as it finds them after the first pass through.
Table 1. Signal Strength of Wi-Fi This will find the most powerful wireless interface and
turn on monitor mode. If a monitor mode interface is
7. Access Points already up it will use the first one it finds instead. It
will then start sequentially hopping channels 1 per
An access point is a device, such as a wireless router, second from channel 1 to 11 identifying all access
that allows wireless devices to connect to a network. points and clients connected to those access points. On
Most access points have built-in routers, while others the first pass through all the wireless channels it is only
must be connected to a router in order to provide identifying targets. After that the 1 second per channel
network access. An access point connects to a wired time limit is eliminated and channels are hopped as
router, switch, or hub via an Ethernet cable, and soon as the deauth packets finish sending. Upon
projects a Wi-Fi signal to a designated area. The AP hopping to a new channel it will identify targets that
usually connects to a router (via a wired network) as a are on that channel and send 1 deauth packet to the
standalone device, but it can also be an integral client from the AP, 1 deauth to the AP from the client,
component of the router itself. An AP is differentiated and 1 deauth to the AP destined for the broadcast
from a hotspot, which is the physical location where address to deauth all clients connected to the AP.
Wi-Fi access to a WLAN is available. Hopping to a targeted jamming is used to deauth a particular client
channel it will identify targets that are on that channel from an access point.to deauthenticate all the clients
and send 1 deauth packet to the client from the AP, 1 from an access point it becomes the MAC of that AP
deauth to the AP from the client, and 1 deauth to the and hence all the clients are deauthenticated. We can
AP destined for the broadcast address to deauth all also set a max number of client/AP combos that the
clients connected to the AP.This would mainly be an script will attempt to deauth. When the max number is
access point's MAC so all clients associated with that reached, it clears and repopulates its list based on what
AP would be deauthenticated. Upon hopping to a new traffic it sniffs in the area. This allows you to
channel it will identify targets that are on that channel constantly update the deauth list with client/AP
and send 1 deauth packet to the client from the AP, 1 combos who have the strongest signal in case you were
deauth to the AP from the client, and 1 deauth to the not stationary. We can also set a max and not have the
AP destined for the broadcast address to deauth all deauth list clear itself when the max is hit.If it is used
clients connected to the AP. Many APs ignore deauths in an organisation it shows all the available hotspot
to broadcast addresses. This would mainly be an access which is not in a frequency range of your mobile, so
point's MAC so all clients associated with that AP the frequency range is higher than the mobile phones,
would be deauthenticated, but you can also put a client thus it is one of the finest way of jamming a wifi.
873
International Journal of Pure and Applied Mathematics Special Issue
9. Outline of Raspberry Pi
Figure 8. WPA Wordlist Mode
874
International Journal of Pure and Applied Mathematics Special Issue
In our project the raspberry pi board is configured to Figure 12. Bandwidth Control
host a local network. Nodogsplash is hosted in
raspberry pi to handle PHP and HTML for 16. Firewall
advertisement purposes. Since raspberry pi consists of
several ports, one such port is configured to send Nodogsplash uses iptables to handle, mark, monitor the
acknowledgment and advertisement to the devices that packets that it sends we have to turn off the built-in
connect to this network. firewall.
14. Customizing the splash page 18. Restricting access to dns vpns
The splash page can be customized according to the The default config opens tcp and udp port 53 without a
network provider’s need. Images can be included to the redirecting it to a DNS. These ports can be used by any
splash page externally using .css file. We should add a VPN software and exploit it. We can limit it by
link for authentication somewhere in splash.html. changing them.
875
International Journal of Pure and Applied Mathematics Special Issue
ii. Trusted
iii. Authenticated
876
International Journal of Pure and Applied Mathematics Special Issue
[5] https://www.metageek.com/training/resources/w
ifi-signal-strength-basics.html
[6] https://pimylifeup.com/raspberry-pi-captive-
portal/
[7] https://wiki.openwrt.org/doc/howto/wireless.hot
spot
[8] T. Padmapriya and V. Saminadan, “Improving
Throughput for Downlink Multi user MIMO-LTE
Advanced Networks using SINR approximation and
Hierarchical CSI feedback”, International Journal of
Mobile Design Network and Innovation- Inderscience
Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23,
May 2015.
[9] S.V.Manikanthan and D.Sugandhi
Figure 16. NODOGSPLASH “ Interference Alignment Techniques For Mimo
Multicell Based On Relay Interference Broadcast
24. Conclusion Channel ” International Journal of Emerging
Technology in Computer Science & Electronics
This Wi-Fi jammer is inexpensive and uses python (IJETCSE) ISSN: 0976-1353 Volume- 7 ,Issue 1 –
which is fairly easy to understand. In some situations MARCH 2014
jamming wireless networks can be viewed as illegal but [10] S.V. Manikanthan , T. Padmapriya “An
this project aims in legal intervention of networks and enhanced distributed evolved node-b architecture in 5G
in favour of law enforcements. tele-communications network” International Journal of
Engineering & Technology (UAE), Vol 7 Issues No
25. Future Enhancement (2.8) (2018) 248-254.March2018
Since this project is related to jamming it has a huge
scope of future enhancement. With the help of current
concept advertisement can be implemented. Another
future enhancement is that targeted jamming can be
done. If a user decides to register their profile in the
provider’s network, it can be done. Such registered
user can have internet access.
References
[1] https://en.wikipedia.org/wiki/Wi-
Fi_deauthentication_attack
[2] https://en.wikipedia.org/wiki/Network_packet
[3] http://blog.petrilopia.net/linux/raspberry-pi-
install-aircrackng-suite/
[4] https://tools.kali.org/wireless-attacks/aircrack-
ng
.
877
878