<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>🔐Hacking Technology Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/security/hacking-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/security/hacking-technology/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 16 Sep 2025 05:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>🔐Hacking Technology Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/security/hacking-technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PATRIOT Act Author The NSA Is Actively Violating The Law</title>
		<link>https://goodshepherdmedia.net/patriot-act-author-the-nsa-is-actively-violating-the-law/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 05:51:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[PATRIOT Act]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21927</guid>

					<description><![CDATA[PATRIOT Act Author: The NSA Is Actively Violating The Law Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees. In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline heading-xl ">PATRIOT Act Author: The NSA Is Actively Violating The Law</h1>
<p>Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.</p>
<p>In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.</p>
<p class="p1">Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if &#8220;the records are relevant to an ongoing foreign intelligence investigation.&#8221;</p>
<p class="p1">In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.</p>
<p class="p1">Sensenbrenner and the other members of Congress who enacted Section 215 &#8220;did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope,&#8221; according to the brief.</p>
<p class="p1">The brief goes on to propose this question (emphasis ours):</p>
<p class="p1">The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. <strong>How can every call that every American makes or receives be relevant to a specific investigation?</strong>&#8220;</p>
<p class="p1">Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner &#8220;was not aware of the full scope of the program when he voted to reauthorize Section 215&#8221; and would have voted against it if he had known.</p>
<p class="p1">In Sensenbrenner&#8217;s words: &#8220;The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now.&#8221;  <a href="https://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</title>
		<link>https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 21:49:26 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Apps and Methods You Should Know]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Detecting IMSI Catchers: Tools]]></category>
		<category><![CDATA[IMSI Catcher]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<category><![CDATA[IMSI catchers: a security threat]]></category>
		<category><![CDATA[Stingray phone tracker]]></category>
		<category><![CDATA[Understanding How IMSI-Catchers Exploit Cell Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21336</guid>

					<description><![CDATA[Detecting IMSI Catchers: Tools, Apps and Methods You Should Know An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. While some security measures exist in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</h1>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-21340" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg" alt="" width="800" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-400x400.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-150x150.jpg 150w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-768x768.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p><span data-huuid="12916251619821288363">An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. </span><span data-huuid="12916251619821288608">It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. </span><span data-huuid="12916251619821288853">While some security measures exist in newer standards (like 3G), sophisticated attacks can bypass these, especially on older networks. </span><span data-huuid="12916251619821289098">These devices, like the <span class="M5tQyf"><strong>StingRay</strong>,</span> are used by law enforcement and intelligence agencies, but their use raises privacy and civil liberty concerns.<span class="pjBG2e" data-cid="0254da5d-6a60-4252-9748-b8be8c5ec492"><span class="UV3uM"> </span></span></span></p>
<h2>IMSI catchers: a security threat</h2>
<div id="aim-chrome-initial-inline-async-container" data-ved="2ahUKEwj5tOPnsMyOAxXsJEQIHf4cG7QQ_ZkOegYIAQgAEBQ" data-hveid="CAEIABAU">
<div data-processed="true">
<div class="CKgc1d" data-scope-id="turn" data-processed="true" data-complete="true">
<div class="Zkbeff" data-subtree="aimc" data-aimmrs="true" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ2O0OegQIABAA" data-hveid="CAAQAA" data-processed="true" data-complete="true">
<div class="pWvJNd" data-processed="true" data-complete="true">
<div class="mZJni" data-container-id="main-col" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ3KYQegQIABAD" data-processed="true" data-complete="true">
<div class="Y3BBE" data-hveid="CAAQEg" data-complete="true" data-processed="true">An IMSI catcher, sometimes called a Stingray, is a device that impersonates a legitimate cell tower. It works by mimicking cell tower signals and attracting nearby mobile devices, tricking them into connecting to the device instead of a genuine cell tower. Once a device connects, the IMSI catcher can capture the device&#8217;s unique identifier, the International Mobile Subscriber Identity (IMSI).<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="daf9ecda-6d56-4163-b71b-24f3c7686c4a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAT"></button></span></span></div>
<div class="Y3BBE" data-hveid="CAAQFA" data-processed="true" data-complete="true">This allows the IMSI catcher to:</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQFg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Track the device&#8217;s location</b> by analyzing the signal strength of the phone.</span></li>
<li data-hveid="CAAQFw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Identify and monitor activity</b>, and potentially even intercept communications, including SMS and calls, depending on the network protocol.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="670887ed-08de-4a8c-9ff5-7bf40ef17ffd" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAY"></button></span></span></li>
</ul>
<div class="Y3BBE" data-hveid="CAAQGg" data-processed="true" data-complete="true">IMSI catchers can be used by law enforcement, and potentially by unauthorized actors including criminals or foreign intelligence services. The use of these devices raises significant privacy concerns due to the indiscriminate collection of data, which may include bystanders as well as targeted individuals.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="54c6456f-6f79-45d6-8c0f-760c83c9443a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAb"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Potential threats</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQHQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Location Tracking:</b> IMSI catchers can track a phone&#8217;s location and movements.</span></li>
<li data-hveid="CAAQHg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Communication Interception:</b> Older generation networks (like 2G) are more vulnerable, allowing interception of calls and texts. While 3G, 4G, and 5G networks are more secure, some IMSI catchers can potentially force a device to downgrade to an older, less secure network.</span></li>
<li data-hveid="CAAQHw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Denial of Service:</b> IMSI catchers can also disrupt mobile network connectivity.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="b15d0dc0-c4f4-4750-be02-e68a02eaf8c9" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAg"></button></span></span></li>
</ul>
<div class="Fsg96" data-complete="true" data-processed="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Detection</div>
<div class="Y3BBE" data-hveid="CAAQIg" data-complete="true" data-processed="true">Detecting IMSI catchers with a smartphone alone can be difficult. Hardware-based detection systems provide a more reliable means of identification.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="7d40a971-c6b4-42c0-8686-6b9a9a15c3a0" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAj"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Protecting yourself</div>
<ul class="U6u95" data-processed="true" data-complete="true">
<li data-hveid="CAAQJQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Keep software updated:</b> Ensure your phone&#8217;s operating system and applications are up to date.</span></li>
<li data-hveid="CAAQJg" data-sae="" data-complete="true"><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Use encrypted communication tools:</b> Utilize apps like Signal or WhatsApp that offer end-to-end encryption.</span></li>
<li data-hveid="CAAQJw" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider using a VPN:</b> A VPN can encrypt your internet traffic.</span></li>
<li data-hveid="CAAQKA" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Enable Airplane mode:</b> When not actively using your phone, switching to airplane mode can help prevent connections to cell towers, including IMSI catchers.</span></li>
<li data-hveid="CAAQKQ" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Be aware of your surroundings:</b> Pay attention to suspicious devices resembling cell towers, especially in sensitive areas or during events like protests or rallies.</span></li>
<li data-hveid="CAAQKg" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider a Faraday cage:</b> A Faraday cage can block radio waves and protect your phone from interception.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> </span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<p><iframe title="What is an IMSI Catcher?" width="640" height="360" src="https://www.youtube.com/embed/wqhtMiKaLk0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>IMSI catchers, sometimes referred to as cell-site simulators or fake cell towers, can be difficult to detect since they imitate real cell towers to capture mobile phone data. With proper cybersecurity testing measures, you can effectively be alert to these unwanted interceptions. Take a look at these common tools and methods that can efficiently assist in identifying IMSI catchers:</p>
<h2><strong>Top Techniques and Resources to Detect IMSI Catchers</strong></h2>
<h3><strong>1. Use Mobile Apps and Tools</strong></h3>
<p>Some apps and technologies are designed to monitor and detect irregularities in cell networks.</p>
<p><strong>SnoopSnitch (Android):</strong> This app analyses your phone’s network traffic and alerts you of strange cell tower behaviour. It requires access to low-level network data, which is mostly limited to particular Android phones equipped with Qualcomm chipsets.</p>
<p><strong>Cell Spy Catcher (Android):</strong> After starting the learning process of this app, it collects data on local networks to identify which one among them is a trap. Then it alerts you with a red interface screen.<br />
<strong>AIMSICD (Android):</strong> Detects IMSI catchers and reports on odd network activity, such as quick cell tower changes or downgrades to earlier network technologies (such as 2G). Phones switching to older network technologies usually happen due to IMSI catchers.</p>
<p><strong>Croatian Telecom’s AntiSpy (Android/iOS):</strong> An app that uses radio signal analysis to determine when your phone connects to a rogue cell tower.</p>
<p>Apple’s limitations on low-level network data access have led to a decrease in the number of apps accessible for iOS; however, network abnormalities can occasionally be found by keeping an eye on variations in signals.</p>
<h3><strong>2. Look for Unusual Network Activity</strong></h3>
<p>IMSI catchers can force phones to connect to low-security older networks (2G or 3G) to facilitate communication interceptions. Look out for:</p>
<p><strong>Downgraded connection:</strong> Your phone may unexpectedly switch from 4G/5G to 2G/3G or lose high-speed internet connection. Specifically, if it happens in an area that has outstanding coverage, it could be due to an IMSI catcher.</p>
<p><strong>Frequent disconnections:</strong> When an IMSI catcher is nearby, your phone might keep on disconnecting and reconnecting with the network.</p>
<p><strong>Suspicious network names:</strong> IMSI catchers can also broadcast non-standard or dubious network IDs. For example, a tower with an unusual name or ID might be a fake one.</p>
<h3><strong>3. Observe Battery and Signal Behaviour</strong></h3>
<p>IMSI catchers compel gadgets to transmit at faster speeds and consume more power.</p>
<p><strong>Rapid battery drain:</strong> If the battery on your phone runs out more quickly than usual, it can be because it’s transferring an unusual amount of data to a fake tower.</p>
<p><strong>Unusual signal intensity:</strong> An IMSI catcher may be indicated by abrupt, inexplicable changes in signal strength or highly fluctuating signal bars. Strong signals can be sent by these devices to overpower authorised cell towers.</p>
<h3><strong>4. Monitoring Tools for Experts</strong></h3>
<p>Advanced phone users with proper cybersecurity knowledge can utilise monitoring software or equipment to analyse cellular networks themselves.</p>
<p><strong>Software-defined radios (SDRs):</strong> SDR devices enable users to identify and analyse mobile phone signals. By identifying aberrant radio frequencies and patterns, an SDR can aid in the detection of IMSI catchers if used with the appropriate software.</p>
<p><strong>Cellular anomaly detectors:</strong> These are sophisticated technologies used by security experts and researchers that monitor local signals. These help detect abnormal cell tower behaviour that is essential in the <strong>current rise of data breaches</strong>, unexpected cyber attacks, or traffic demand in Australia.</p>
<h3><strong>5. Network Data Monitoring</strong></h3>
<p>Certified cyber security consultants in Australia suggest users to monitor network data. This includes the phone’s network logs like signal strength, base station ID, and encryption status that certain apps or customised firmware can access. Keeping an eye on this data can help determine when the phone connects to a dubious tower that may have less secure encryption or an unidentified ID.</p>
<h3><strong>6. Physical Indicators</strong></h3>
<p>IMSI catchers are usually non-stationary and can be implanted on vehicles or drones. So if you observe any strange and unknown vehicles or equipment within your local area and your phone network falters near it, it could be a clue.</p>
<h3><strong>7. Use Encrypted Communication</strong></h3>
<p>If you are wary of an IMSI catcher but are tech savvy or cannot locate it, resolve to the simple methods of using end-to-end encrypted apps. Switch to apps like WhatsApp, Signal, or Telegram for calls and texts for that while. These platforms prevent intercepted communications from being decoded, even if you do not know how to use tools for detecting IMSI catcher.</p>
<p><strong>Limitations</strong></p>
<p><strong>False positives:</strong> Certain apps, software, or devices may identify normal network issues as suspicious.</p>
<p><strong>Limited detection on iPhones:</strong> iOS restricts access to low-level radio data, making it more difficult to operate apps that monitor cellular networks. <a href="https://www.cyberneticgi.com/2024/10/15/detecting-imsi-catchers-tools-apps-and-methods/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="entry-title wp-block-post-title">With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes</h1>
<p>With some dirt cheap tech I bought from Amazon and 30-minutes of set-up time, I was streaming sensitive information from phones all around me. IMSIs, the unique identifier given to each SIM card, can be used to <a href="https://motherboard.vice.com/en_us/article/zmkj38/emf-camp-imsi-catcher-" target="_blank" rel="noopener">confirm whether someone is in a particular area</a>. They can also be used as part of another attack to take over a person’s phone number and redirect their text messages. Obtaining this information was incredibly easy, even for a non-expert.</p>
<div class="wp-block-savage-platform-primis-video">
<div class="wp-block-savage-platform-primis-video__wrapper">
<div>
<div class="primisslate">
<div id="primis_container_div_687d600c04235">
<div id="primis_playerSekindoSPlayer687d600c04232">
<div id="Player-Div-SekindoSPlayer687d600c04232">
<div id="Video-Div-SekindoSPlayer687d600c04232">
<div id="pixelsDiv"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>This attack isn’t revolutionary in any way—IMSI-catchers <a href="https://motherboard.vice.com/en_us/article/nz798m/harris-imsi-catcher-picture-phone-tracking-device-in-the-wild" target="_blank" rel="noopener">are certainly not new</a>, and have become famous because they are commonly (and controversially) used by law enforcement to track suspected criminals. A commercial version made by Harris is called a “Stingray,” and they are sometimes called “cell-site simulators” or “fake cell towers.” This is because they spoof a cell phone tower’s connection, meaning that cell phones in the area will try to connect to it; in doing so, the IMSI-catcher is able to passively collect information about phones in the area.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-2" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-1" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded"></div>
</div>
</div>
<p>Harris’s Stingray was so secretive that, for years, the <a href="https://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/" target="_blank" rel="noopener">FBI dropped criminal court cases</a> that used Stingrays rather than reveal the details of how the evidence was gathered.</p>
<p>But a DIY IMSI catcher is relatively trivial to setup, and the technology is accessible to anyone with a cheap laptop, $20 of gear, and, the ability to essentially copy and paste some commands into a computer terminal. This is about ease of access; a lower barrier of technical entry. In a similar way to so-called spouseware—<a href="https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x" target="_blank" rel="noopener">malware used by abusive partners</a>—surveillance takes on different character when it trickles down to more ordinary, everyday users. The significance and threat from IMSI-catchers is multiplied when a lot more people can deploy one.</p>
<p class="article__blockquote"><i><b>Got a tip? You can contact Joseph Cox securely on Signal on +44 20 8133 5190, OTR chat on jfcox@<span class="skimlinks-unlinked">jabber.ccc.de</span>, or email <span class="skimlinks-unlinked">joseph.cox@vice.com</span>.</b></i></p>
<p>For legal and technical reasons, our IMSI-catcher did not intercept text messages or phone calls, like more powerful versions can. It only captured IMSIs from devices, as well as provides some additional information such as the country and telecom operator of the phone. Motherboard did not store any of the collected data. You should be aware of the laws in your local region before attempting to do this; Motherboard does not condone or suggest you do anything illegal (and, even if legal, you shouldn’t use an IMSI catcher to do anything creepy.)</p>
<p>We’ll explain what each of these are, but in short, the process was:</p>
<ul class="wp-block-list">
<li>Buy a cheap, software defined radio</li>
<li>Install Ubuntu</li>
<li>Download IMSI-catcher script with its dependencies</li>
<li>Find the right frequency to scan for</li>
<li>Start scanning on that frequency and picking up IMSIs</li>
</ul>
<div class="code-block code-block-1"></div>
<div class="article__media--image"></div>
<p>As the name implies, a software defined radio, or SDR, is simply a radio that instead of having its feature baked in at a hardware level, can be controlled by a computer program. We bought <a href="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" target="_blank" rel="noopener" data-ml-dynamic="true" data-ml-dynamic-type="sl" data-orig-url="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" data-ml-id="0" data-ml="true" data-xid="fr1753047054953cei" data-skimlinks-tracking="xid:fr1753047054953cei">the ‘NooElec NESDR Mini’ from Amazon for around $20</a> and received it a few days later.</p>
<p>To get the SDR to talk to phones, I needed to give it some instructions. Fortunately, I didn’t need to write my own, but just take some code from GitHub. I used a Python tool <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">simply called ‘IMSI-catcher’</a>, written by the hacker known as Oros42. The program requires an up-to-date version of Ubuntu, a particular Linux distribution, that can be downloaded for free and written either to a USB stick or installed inside a virtual machine.</p>
<p>To install the IMSI-catcher software, I just followed the instructions on <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">the project’s GitHub</a>.</p>
<p>Once installed, I booted up grgsm_livemon, one of the programs included with the project. which presented a slider and a graph, to find a frequency to scan. This required a bit of trial and error—moving the frequency slider until finding a sweet spot where the graph represented a bell curve. The curve meant that the SDR had found what frequency nearby phones were broadcasting on. Depending on where you are, that frequency is going to be different.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-7" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_1-4" class="lngtd-dynamic-ad-container" data-label="Advertisement"></div>
</div>
</div>
<p>Once I found the sweet spot, after a few seconds IMSIs started appearing on my screen.</p>
<figure class="wp-block-image"><img decoding="async" class="attachment-full size-full" src="https://www.vice.com/wp-content/uploads/sites/2/2018/11/1542319074607-IMG_4742.png" alt="imsi-catcher" width="1107" height="584" /><figcaption class="wp-element-caption">Caption: A redacted photo of IMSIs captured by the SDR and related script. Image: Motherboard</figcaption></figure>
<div class="code-block code-block-1">
<div id="htlad-post-article-8" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-4" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded" data-google-query-id="CIOr6aC0zI4DFUjcuAgdCJ0Z_g">
<div id="google_ads_iframe_/16916245/vice/vice_D_inarticle_2_3__container__"></div>
</div>
</div>
</div>
<p>If I wanted to make the IMSI-catcher a bit more portable, I could theoretically run it on a Raspberry-Pi, a miniature computer you can buy for as little as $30 or cheaper, depending on what model you need. Note that the IMSI-catcher would still need to have Ubuntu on the Pi, which it is not traditionally designed for, <a href="https://linuxconfig.org/install-ubuntu-16-04-mate-or-ubuntu-18-04-on-raspberry-pi" target="_blank" rel="noopener">but it is likely possible</a>. I would also need to make sure the SDR is receiving enough power from the USB port.</p>
<p>In all, the process of making an IMSI-catcher didn’t take much time at all, as I thankfully didn’t hit any roadblocks. I just made sure I had the latest version of Ubuntu, followed the instructions carefully, and ended up with an IMSI-catcher on my laptop. <a href="https://www.vice.com/en/article/how-i-made-imsi-catcher-cheap-amazon-github/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<blockquote>
<h3><span style="color: #008080;"><a class="url fn" href="https://github.com/Oros42" rel="author" data-hovercard-type="user" data-hovercard-url="/users/Oros42/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">Oros42</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/Oros42/IMSI-catcher" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">IMSI-catcher DOWNLOAD HERE</a> i</strong>MSI CATHER SOFTWARE AND BUILD YOUR OWN!<span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3><span class="author flex-self-stretch"><a class="url fn" href="https://github.com/CellularPrivacy" rel="author" data-hovercard-type="organization" data-hovercard-url="/orgs/CellularPrivacy/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">CellularPrivacy</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">Android-IMSI-Catcher-Detector DOWNLOAD HERE </a></strong><span style="color: #008080;">IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
</blockquote>
<p>&nbsp;</p>
<hr />
<h1>Gotta Catch &#8216;Em All: Understanding How IMSI-Catchers Exploit Cell Networks</h1>
<div class="panel-pane pane-node-content">
<article class="node node--whitepaper node--full node--whitepaper--full" role="article">
<div class="node__content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden">
<div class="field__items">
<div class="field__item even">
<h2>Section 1: Introduction</h2>
<p>You’ve probably heard of Stingrays or IMSI-catchers, which belong to the broader category of “Cell Site Simulators” (CSSs). These devices let their operators “snoop” on the phone usage of people nearby. There’s a lot of confusion about what CSSs are actually capable of, and different groups—from activists to policy makers to technologists—understand them differently.</p>
<p>In the research community, there has been a tendency to dismiss the prevalence of CSS and the threat they pose to the public. Congress <a href="https://fcw.com/articles/2019/02/21/cell-site-simulators-congress.aspx">recently asked</a> the Department of Homeland Security for more information about their use by federal law enforcement, as well as state and local partners. It&#8217;s unclear how much oversight the Department has been exercising, and when it comes to state and local law enforcement, only a few cities have any protections at all. Many activists aren’t aware that CSSs could be in use around them without their knowledge, particularly during protests. The truth is that CSSs are significantly more widespread than most policy makers, researchers, and activists are aware, and their danger to privacy is more significant than most realize. Of course, it’s hard to acknowledge the prevalence of CSSs when law enforcement goes to great lengths to keep information about them from the public.</p>
<p>There is a plethora of low-level academic research in the area of cell network security, and many high-level posts that don’t really explain in any meaningful detail what’s going on with “IMSI-catcher” type cell network attacks. Our goal is to bridge that gap, and with this post we hope <strong>to make accessible the technical inner workings of CSSs, or rather, the details of the kind of attacks they might rely on</strong>. For example, what are the different kinds of location tracking attacks and how do they actually work? Another example: it’s also widely believed that CSSs are capable of communication interception, but what are the known limits around cell network communication interception and how does that actually work?</p>
<p>We won’t be updating this post with new kinds of attacks as they come out, and we can’t cover every potentially relevant detail of every attack we explain, but this post should form a basis for non-experts to better understand new attacks.</p>
<h2><a id="BackgroundInfo"></a>Section 2: Necessary background info</h2>
<p>There’s a lot of confusion about what CSSs actually do and how they do it. This confusion comes from the fact that the term “cell site simulator” actually encapsulates quite a variety of different cell network attacks that have evolved significantly over the last 25 years or so. Adding to the confusion is the fact that the term “IMSI-catcher” is both used interchangeably with “cell site simulator” and also refers to specific capabilities that some CSSs have.</p>
<p>A very important distinction when talking about CSSs is which cell network generations they use when operating. The term “cell network generation” refers to the complete set of operating protocols covering everything from how cell towers are laid out geographically to how a mobile phone establishes a connection with a cell tower.</p>
<p>Here’s a high-level overview of the most relevant cell network generations:</p>
<ul>
<li>2G (e.g. GSM): the oldest type of cell network still in use and still very widely used. 2G only supports calling/texting, but in 2.5G the capability to support data transmission (e.g. email and Internet access) was introduced.</li>
<li>3G (e.g. UMTS or CDMA2000): improved upon 2G by having much faster data rates (which could support video calls, for example) and adding better security (more on this later).</li>
<li>4G (e.g. LTE or WiMax): significantly faster speeds and better security.</li>
</ul>
<p>The specifications for these networks are developed by working groups organized by the 3GPP,<sup id="fnref1"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn1" rel="footnote">1</a></sup> an international organization that any group can apply to join (though it has a high membership fee). Members typically include mobile carriers, university research labs, and wireless gear manufacturers (including surveillance tech manufacturers).</p>
<p>It’s important to note that in practice there’s often a lot of variance between what the specifications say and what actually ends up being implemented. This is usually due to (1) implementers needing to differ from the specifications for practical reasons (many parts of the specifications get marked as optional), and (2) mistakes.</p>
<p>There’s a bit more vocabulary and background that needs to be introduced:</p>
<ul>
<li>IMSI (International Mobile Subscriber Identity): the unique identifier linked to your SIM card that is one of the pieces of data used to authenticate you to the mobile network. It’s meant to be kept private (because, as we’ll see later, it can be linked to your physical location and your phone calls/messages/data).</li>
<li>TMSI: upon first connecting to a network, the network will ask for your IMSI to identify you, and then will assign you a TMSI (Temporary Mobile Subscriber Identifier) to use while on their network. The purpose of the pseudonymous TMSI is to try and make it difficult for anyone eavesdropping on the network to associate data sent over the network with your phone.</li>
<li>IMEI (International Mobile Equipment Identity): the unique identifier linked to your physical mobile device.</li>
<li>Ki: a secret cryptographic key also stored on the SIM card used to authenticate your phone to the network (and prove you are who you say you are).</li>
<li>MCC (Mobile Country Code): your mobile country code, but not to be confused with a country’s <a href="https://en.wikipedia.org/wiki/List_of_mobile_telephone_prefixes_by_country">mobile telephone prefix</a>. For example, Canada’s MCC is 302, but its telephone prefix is +001.</li>
<li>MNC (Mobile Network Code): the code that represents which carrier you’re using. For example, 410 is one of AT&amp;T’s MNCs.</li>
<li>Cell ID: each cell tower is responsible for serving a small geographic area called a cell, which has a cell ID attached it.</li>
<li>LAC/TAC (“Location Area Code”): in GSM, groups of nearby cells are organized by ID into “Location Areas” (“LA” for short), with each LA’s identifier being referred to as a “Location Area Code”. In 4G these are respectively referred to as Tracking Area (TA) and Tracking Area Code (TAC).</li>
<li>BTS (“base station”): a more general term for devices like cell towers (and CSSs pretending to be cell towers).<sup id="fnref2"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn2" rel="footnote">2</a></sup></li>
</ul>
<p>It’s important to note that some of this terminology varies by network generation. For example, in LTE a base station is referred to as an eNodeB, and in 3G/UMTS the LAC and Cell ID are replaced by PSC (primary scrambling code) and CPI (Cell Parameter ID). For simplicity, we will be sticking to the above terminology.</p>
<h2><a id="OverviewAttacks"></a>Section 3: Overview of attacks</h2>
<p>To be clear, as far as we know no one (outside of government or surveillance tech vendors) has ever gotten their hands on a commercial CSS (e.g. a Harris Corp Stingray) and published publicly available details of its inner workings, so this information all comes from academic literature and the work of open source hackers attempting to reproduce how commercial CSSs might work.</p>
<p>There are three main categories of attacks that will be covered:</p>
<ol>
<li>Communication interception</li>
<li>Denial of service and service downgrading</li>
<li>Location tracking</li>
</ol>
<p>Practical implementation details are left out of the following explanations for the sake of brevity.</p>
<h3><a id="BasicIMSICatcher"></a>Section 3.1: Basic IMSI-catcher</h3>
<p>Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. They quite literally “catch” (i.e. record) IMSIs by pretending to be real base stations and then release the target phones (Paget, 2010). Let’s go over how they work in more detail.</p>
<p>In GSM networks, phones will try to connect to whatever base station is broadcasting at the highest signal strength.</p>
<p><img decoding="async" class="alignnone size-full wp-image-21365" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>Once a phone has identified a base station as having the best signal strength, it can begin negotiating a connection to it. The base station first asks the phone to send its encryption capabilities to it. If the base station is a CSS rather than a cell tower, it can then either ignore the response or set it to have no encryption.<sup id="fnref3"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn3" rel="footnote">3</a></sup></p>
<p>After this, the base station sends an Identity Request, which the phone responds to with its IMSI. The phone does this because the IMSI is stored on your SIM card, which was issued by your mobile carrier, and the phone network needs to identify that you are in fact a paying customer associated with a mobile carrier. After receiving your IMSI, the CSS then releases your phone back to the real network and moves on to try and capture another phone’s IMSI. That’s all it takes to collect an IMSI from a nearby phone!</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21364" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">The CSS sends an Identity Request to collect the target mobile phone’s IMSI. Afterwards, it proceeds to repeat this same action with other phones.</p>
</div>
</div>
</div>
<p>If law enforcement is operating such a CSS in a geographic area, once they’ve obtained the relevant IMSIs, they can then use legal process to get more data on all the users who were present.<sup id="fnref4"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn4" rel="footnote">4</a></sup></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21363" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>From here, many more sophisticated attacks can be launched, but that’s how the most basic kind of IMSI-catchers work: they simply collect IMSIs during the connection procedure, then abort the connection procedure and move on to their next target.</p>
<p>In later protocols (e.g. 4G/LTE), phones are a bit smarter about not connecting to any random base station with high signal strength, so an attacker needs more involved techniques to convince a phone to connect to their CSS. See section 3.3 for details.</p>
<h3><a id="Interception"></a>Section 3.2: Communication interception</h3>
<p>As far as we know, communication interception between a mobile phone and a legitimate cell tower is <strong>only possible in GSM</strong> (as opposed to later 3G or 4G protocols). There are two reasons for this:</p>
<ol>
<li>Communicating over GSM doesn’t always require encryption.</li>
<li>Even when encryption is enabled, several of the cryptographic algorithms used in GSM can be broken (and in real time).</li>
</ol>
<p>Imagine that the CSS is trying to launch an active attack where it intercepts a phone’s communications. The CSS must be able to situate itself between the phone and the tower to be able to do so, which is what’s usually referred to as a “machine in the middle” (MitM) attack.</p>
<p>There are two main steps to completing the MitM:</p>
<ol>
<li>Spoofing authentication: the CSS needs to convince the network that it’s actually the targeted mobile phone. (Section 3.2.1)</li>
<li>Deal with any encryption the network tries to set (i.e. disable it or try to break it). (Section 3.2.2)</li>
</ol>
<h4><a id="Spoofing"></a>Section 3.2.1: Spoofing authentication</h4>
<p>Picking up from Section 3.1 where the CSS has already obtained a phone’s IMSI via an Identity Request:</p>
<ol>
<li>The CSS reaches out to a legitimate cell tower with a Location Update Request. This type of request is used to update the cell network about a phone’s location (specifically, its LAC), which the phone needs to do periodically in order for the network to be able to route calls and messages to it quickly.</li>
<li>In response to the Location Update Request, the cell network asks the CSS to identify itself using an Identity Request. The CSS responds using the stolen IMSI.</li>
<li>At this point the tower responds with a cryptographic challenge that requires the secret key Ki (stored on the SIM card) to solve. Since the CSS doesn’t have access to Ki, it passes it onto the phone to solve. The phone solves the challenge, passes it to the CSS, who then passes it back to the network.</li>
<li>After this, the network accepts the connection between it and the CSS as being authenticated.</li>
</ol>
<p>Reminder: this is only applicable to 2G.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21362" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png" alt="" width="1999" height="730" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-400x146.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1024x374.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-768x280.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1536x561.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">An illustration of steps 1-4 from above on how the CSS is able to complete the authentication MitM.</p>
</div>
</div>
</div>
<h4><a id="Encryption"></a>Section 3.2.2: Dealing with encryption</h4>
<p>There are several encryption algorithms used in GSM, and at a high level, they have names like: A5/1, A5/2, etc &#8230; with A5/0 being used to indicate that no encryption is being used.</p>
<p>If the network tries to specify that it wants to communicate using encryption, the CSS can just respond by saying it doesn’t have encryption capabilities and defaults to A5/0. The CSS has now completed the MitM attack and can read the plaintext messages being sent between the phone and the real network.</p>
<p>Alternatively, if the network decides to use the A5/1 algorithm to communicate, this type of encryption can be broken in real time. The details of this attack are beyond the scope of this post, but you can read about it in the Barkan et al 2006 paper. Additionally, the A5/2 algorithm is so weak that its use <a href="https://en.wikipedia.org/wiki/A5/2">has been banned since 2006</a>. While there are <a href="https://en.wikipedia.org/wiki/KASUMI#Cryptanalysis">known attacks against A5/3</a>, there are no known real-time attacks.</p>
<h4><a id="UserAlert"></a>Section 3.2.3: Why aren’t users alerted that encryption is off?</h4>
<p>At this point, many people ask: why doesn’t their phone tell them something’s up? According to the GSM specifications, cell phone users are supposed to be notified when encryption is disabled, and in some markets they used to be. However, this caused a lot of confusion because:</p>
<ol>
<li>People would travel with their phones to places where cell towers were configured very differently (e.g. in some countries cell network encryption is banned) and it would cause a “Warning: encryption disabled” pop-up to come up a lot.</li>
<li>Cell towers everywhere were misconfigured, also causing this pop-up to appear a lot.</li>
</ol>
<p>These issues led to many confused consumers and support calls to mobile carriers, resulting in the warning ultimately being disabled.</p>
<h4><a id="ServiceDowngrading"></a>Section 3.2.4: Service downgrading</h4>
<p>Even though, as far as we know, communication interception is only possible in GSM, it’s trivial to downgrade a target cell phone’s connection from 3G or 4G to GSM (see Section 3.5 for more information). This is because in general the base station gets to pick whatever configuration settings it wants, which includes the ability to request a protocol downgrade. Alternatively, someone could jam the 3G or 4G bands by pumping lots of white noise into them, making it too noisy to establish a connection, and phones will downgrade in search of a usable signal. LTE service downgrading is covered in detail at the end of Section 3.5.</p>
<h3><a id="LTECSS"></a>Section 3.3: LTE CSS connection techniques</h3>
<p>It’s also important to understand how it’s possible for a CSS to get around the safeguards in LTE and other modern protocols that are meant to stop phones from connecting to any base station with a high enough power.</p>
<p>In GSM, phones are always scanning looking for a tower with a higher signal strength to connect to. However, in LTE if the signal strength is above a certain sufficient threshold, the phone will not scan for other towers to connect to in order to save power.</p>
<p>Additionally, in LTE phones keep track of a “nearest neighbors” list that is broadcast from the tower that they are connected to. If for any reason they lose the connection with the tower they’re connected to (or the ability to connect to it), they’ll try to connect to ones that were advertised in the nearest neighbors list first, before doing a full scan of the available LTE bands for other eligible cell towers.</p>
<p>So, how can an attacker force a phone using LTE into connecting to their CSS? One technique would be to masquerade as a tower in the nearest neighbor’s list (e.g. same frequency, same cell id, etc &#8230;) and transmit at a higher power, so the phone will eventually switch over.</p>
<p>But there is a faster technique! It relies on the fact that LTE frequencies are assigned various priorities (this is referred to as “absolute priority based cell reselection”), and if a phone sees that there is a base station operating on a higher priority frequency than the one it’s on, it must switch to it, regardless of its signal strength. To discover the higher priority frequencies used in a given area, all that’s required is to extract them from the unencrypted configuration messages from base stations, which anyone can monitor (Shaik et al, 2017).</p>
<p>Using these techniques, attackers can probably force even an LTE phone to connect to their CSS, which reveals the phone’s IMSI and allows followup attacks.</p>
<h3><a id="TrackingAttacks"></a>Section 3.4: Location tracking attacks</h3>
<p>Often when the dangers of CSSs are being discussed, the focus is on their communication interception ability. However, in practice the consequences of real time location tracking <a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays">are often much more severe</a>. The potential for location tracking by your cell provider is unavoidable, so the specific threat model being used here is a 3rd party (such as a law enforcement agency) trying to get your location without cooperation from your cell provider.</p>
<p>There are generally two types of location tracking that CSSs are capable of:</p>
<ol>
<li><strong>Presence testing:</strong> check if a phone is present in or absent from a geographic area (where geographic area usually means a “Location Area” from before, i.e. a group of cells)</li>
<li><strong>Fine-grained location:</strong> figure out the exact or rough GPS coordinates of a phone either through trilateration or by getting the phone to tell the attacker its exact GPS coordinates</li>
</ol>
<h4><a id="PresenceTesting"></a>Section 3.4.1: Presence Testing in LTE</h4>
<p><strong><em>Passive Presence Testing</em></strong></p>
<p>The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).</p>
<p>A fundamental aspect of wireless technology is the paging model. When the network has a message it wants to route to a phone, it sends an “RRC paging message” which is received by every phone listening to their carrier’s paging frequency in that area (which is basically every phone),<sup id="fnref5"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn5" rel="footnote">5</a></sup> asking for that particular phone to contact the base station to negotiate completing a connection to receive a call or message. Thus, phones are constantly listening for RRC paging messages and receiving and discarding ones not addressed to them.</p>
<p>RRC is short for Radio Resource Control, which is the protocol used to communicate between a cell phone and a base station. The RRC takes care of connection establishment and paging notifications that you’re getting a message or phone call, among other things.</p>
<p>The exact way paging works varies based on several factors, including the type of message the network is trying to route to you. For example, say the network is trying to route a phone call to you. Phone calls are considered high priority (since there’s someone on the other side waiting for you to connect), so the network notifies every cell tower in the last Location Area your phone was in to send out the RRC paging message addressed to your phone (as opposed to only the last cell tower the phone was using). More on this later!</p>
<p>RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area. In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.</p>
<p>Additionally, phones periodically transmit unencrypted messages about their location and measurements of cell service quality that anyone with the right equipment can easily intercept. Sometimes these messages contain the phone’s exact GPS location, but usually the information about the signal strength of nearby cells is enough to calculate the phone’s location. We’ll look at these measurement reports in detail in the Exact GPS Coordinates section below.</p>
<p><strong><em>Semi-Passive Presence Testing</em></strong></p>
<p>Semi-passive means that the attacker only uses network functions in ways in which they are meant to be used. An example of what it means for an adversary to be “semi-passive”: the attacker can text the person they’re trying to track (assuming they know their phone number) in order to generate a paging message being sent to their phone, but they can’t go and send malicious or malformed data to phones or towers in the area (Shaik et al, 2017).</p>
<p>In this section, we are going to cover two location attacks: one which checks for a phone in a given Location Area (“Basic Location Area Test”), and one which checks for a phone connected to a specific cell tower (the “Smart Paging Test” method, which has a much smaller radius of use).</p>
<p><strong><em>Basic Location Area Test</em></strong></p>
<p>The first step of a basic Location Area test is to trigger about 10-20 notifications to the target’s phone via phone calls while also monitoring the RRC paging messages that are sent out. To not alert the user, the attacker can almost immediately hang up after initiating the call so that the paging message makes it to the phone, but the user doesn’t actually get an incoming call notification.</p>
<p>Because there’s someone waiting on the other line to connect to you, phone calls are considered higher priority, so the network notifies every cell tower in the last Location Area the phone was in to send out the RRC paging message (as opposed to only the last cell tower the phone was using). The attacker can then use set intersection analysis (explained in <sup id="fnref6"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn6" rel="footnote">6</a></sup>) with their well-timed calls to figure out the target’s TMSI from the RRC messages.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21360" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">CSS triggering many RRC paging requests to determine if a phone is in a given LA.</p>
</div>
</div>
</div>
<p><strong><em>Smart Paging Test</em></strong></p>
<p>Usually the radius of a Location Area is quite large, so from here the attacker can use something referred to as “smart paging” (explained below) to figure out the exact cell tower the target is using (which translates to knowing the user’s location within a ~2 km radius) (Shaik et al, 2017).</p>
<p>Because general data messages (e.g. WhatsApp and FB Messenger messages) are not high priority, the network initially only broadcasts paging messages for them from the last tower the phone was known to be connected to (this is referred to as “smart paging”). Thus, once the attacker has confirmed the target’s location in a TA (“Tracking Area”), they can test various cells to find the target’s cell. (Note: we’re switching briefly from the “Location Area” terminology to “Tracking Area” here for the sake of a concept covered below.) Similar to before, they send timed WhatsApp or FB Messenger messages and use set intersection analysis to verify the TMSIs being sent in RRC messages in that cell.<sup id="fnref7"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn7" rel="footnote">7</a></sup></p>
<p>Note that in order for this to work, the attacker needs to either have equipment in every cell (which is expensive), or move about through cells repeating this procedure until they get a match.</p>
<h4><strong><a id="ActiveLocationTracking"></a>Section 3.4.2: Active location tracking and exact GPS coordinates</strong></h4>
<p>In this section, the attacker’s assumed goal is to find the target’s exact or rough GPS coordinates. In this section, we’ll be describing active attacks, meaning ones in which the attacker can use any means available to them to figure out their target’s information, including operating a CSS and sending malicious or false information to the phone or other cell towers.</p>
<p>In this scenario, suppose the attacker has a CSS and they’ve managed to lure their target into trying to connect using techniques described in Section 3.3. After completing the initial connection procedure steps, the phone enters into a CONNECTED state.</p>
<p>Now the attacker creates a “RRC Connection Reconfiguration” command, which contains the cell IDs of at least 3 neighbouring cell towers and their connection frequencies and sends this command to their target’s phone.</p>
<p>Usually, the “RRC Connection Reconfiguration” command is used to modify an existing connection to a base station, but the attacker is only interested in the target phone’s initial response to its message. This response contains the signal strengths of the previously specified cell towers, which can then be used to find the phone’s location via trilateration:</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21359" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p class="caption-text">In short, trilateration involves calculating the intersection of circles drawn around the previously specified cell towers, where the radius of each circle is a function of the reported signal strength. Note: trilateration is different than triangulation.</p>
</div>
</div>
</div>
<p>For newer phones and networks which support the “locationInfo-r10” feature, this report will also contain the phone’s exact GPS coordinates, meaning no trilateration calculations are required. The exact GPS coordinates are just a field in the response (Shaik et al, 2017).</p>
<p>In addition to the technique described above, there is another way to get similar trilateration and GPS data by using RLF (“Radio Link Failure”) reports, but we will not cover it in any detail as it’s similar to the techniques just covered.</p>
<h3><a id="DoSDowngrading"></a>Section 3.5: Denial of Service and Downgrading</h3>
<p>Cell network denial of service and protocol downgrade attacks are possible (and can have quite similar implementation details, as we’ll see below). Additionally, downgrade attacks make it such that a target phone can be forced down to a less secure protocol, where more severe privacy invasive attacks can be launched.</p>
<h4><a id="ProtocolDowngrade"></a>Section 3.5.1: Protocol downgrade attacks</h4>
<p>Suppose that the attacker has set up their CSS and tricked the target into trying to connect (which was covered in Section 3.3). After the initial connection procedure, the phone will send a “Tracking Area Update Request” (“TAU” for short). This kind of message is used by the phone to keep the cell network updated about the phone’s most recent location, so that the network can route calls to it faster. TAU Requests are usually sent by phones whenever they’re connecting to a new base station.</p>
<p>The CSS responds with a “TAU Reject” message. Within the Reject message is something referred to as the “EMM cause numbers”, which indicates why the message was rejected. In this case, the attacker sets it to 7 (“LTE services not allowed”).</p>
<p>Upon receiving this EMM value, the phone deletes all information it had about the previous real network it was connected to, and then puts itself in a state where it considers its SIM card to be invalid for LTE. It then searches for 3G and GSM networks to connect to, and will not again try to negotiate an LTE connection until it is rebooted (Shaik et al, 2017).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21358" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p>The key reason why protocol downgrade attacks are so bad is that it renders LTE-capable phones vulnerable to attacks that normally only work on earlier protocols (e.g. the communication interception from Section 3.2).</p>
<h4><a id="DoS"></a>Section 3.5.2: Denial of Service (DoS)</h4>
<p>If the attacker is looking to launch a large scale DoS attack, the simplest thing is to jam the LTE frequencies by pumping them full of white noise. However, there are also techniques for DoS attacks that only target individual phones.</p>
<p>Launching a denial of service attack against an individual phone is exactly the same as the protocol downgrade attack described above, except the CSS responds with EMM cause number 8 (“LTE and non-LTE services not allowed”). The phone then puts itself in a state where it does not try to negotiate any network connections until it’s been rebooted.</p>
<p>Additionally, there has been some research done into denying select network services (e.g. only allowing SMS, and disallowing calls and data), but for the sake of space we will not be covering this. Please see Shaik et al, 2017 below for details.</p>
<h2><a id="Detection"></a>Section 4: Detection methods &amp; apps</h2>
<p>At this point you’re probably wondering:</p>
<ul>
<li>Are there ways to detect CSSs?</li>
<li>How to defend oneself from a CSS?</li>
<li>What led to these vulnerabilities in the cell networks and what do we do about them?</li>
</ul>
<p>These are three questions we’re going to explore in this section, and unfortunately they don’t have simple answers.</p>
<h3><a id="Methods"></a>Section 4.1: Detection methods</h3>
<p>To reiterate an important truth from before: a fundamental problem when researching detection methods is that <strong>we don’t know how commercial CSSs work</strong>. Instead we rely on how we think they might work based on research findings. It’s important to keep this in mind when going over some of the known detection methods below. This following list is not exhaustive, and instead is meant to be an introduction to this topic.</p>
<p><strong>Unusual base station parameters or fingerprints</strong></p>
<ul>
<li>There’s been some speculation that commercial CSSs mask themselves as cell towers that are normally in the area, but with some configuration parameters or characteristics being subtly off (e.g. broadcast power is suddenly much higher), enough so that the “fingerprint” of the tower is different. While configuration parameters and other characteristics differ across network operators, they’re usually uniform across a specific operator (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Missing normal base station capabilities</strong></p>
<ul>
<li>It’s unlikely that a CSS manufacturer will have implemented the full set of capabilities of a normal base station. Missing capabilities, such as not broadcasting certain standard System Information Broadcast (SIB) messages, being unable to respond to certain standard requests, or there being very little to no paging traffic coming from the base station might be indicators of a CSS (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Ephemerality</strong></p>
<ul>
<li>It’s generally believed that CSSs don’t stay in a single place for a significant period of time, and so a base station appearing for only a short period of time could be worth investigating. However, there are also many completely normal reasons why something would only appear for a short period of time. For example, it could simply be testing equipment, or if there’s a large event happening, it could be there to help facilitate the increased traffic load.</li>
</ul>
<p>The cell landscape is ever changing. Large scale and long term data collection is the best way to survey an area to be able to determine what’s normal versus what’s unusual. The <a href="https://seaglass.cs.washington.edu/">University of Washington’s Sea Glass project</a> is a great example of this.</p>
<p>You can read much more about this topic in Dabrowski et al’s IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. To reiterate, while these could be indicators that something’s amiss, there are also many completely normal reasons (that have nothing to do with surveillance) as to why we’d be seeing unusual behaviour. E.g. testing equipment, temporary equipment brought in for a large event (e.g. at a sporting event), a cell tower crashed and upon restarting broadcasts temporarily incorrect values until it’s completely finished restarting, and so on.</p>
<h3><a id="Apps"></a>Section 4.2: Detection apps</h3>
<p>Many apps have been released that claim to alert users when it seems likely they’re connected to a CSS. The most popular ones include: <a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki">Android IMSI-Catcher Detector (AIMSICD)</a>, <a href="https://opensource.srlabs.de/projects/snoopsnitch">SnoopSnitch</a>, <a href="https://sitch.io/">Sitch</a>, <a href="https://play.google.com/store/apps/details?id=kz.galan.antispy">GSM Spy Finder</a>, <a href="https://play.google.com/store/apps/details?id=com.skibapps.cellspycatcher&amp;hl=en_US">Cell Spy Catcher</a>. The quality of these apps varies, and some are still popular despite no longer being maintained.</p>
<p>Most of these apps implement at least some of the detection methods listed above and in Dabrowski et al. Even though sometimes multiple apps will have implemented the same detection methods, they won’t necessarily produce the same result when evaluating if a particular base station is suspicious or not (Borgaonkar et al, 2017). Let’s look at some examples of how detection apps have failed to include basic detection heuristics, as well as how there could be discrepancies in the evaluations they produce.</p>
<p><em>Varying power levels</em></p>
<p>One of the previously described detection methods is to track if a tower you’ve seen before suddenly broadcasts at much higher power. In Borgaonkar et al’s <em>White-Stingray: Evaluating IMSI Catchers Detection Applications</em>, researchers analyzed four of the previously mentioned apps and found that while most of them stored regular measurements of BTS power levels, none of them compared new values to historical values. This means that none of the apps could detect when towers had an unusually high broadcast power.</p>
<p><strong><em>LAC change</em></strong></p>
<p>As we saw in Section 3.2.1, when phones move to a new Location Area (or when they’re in the process of connecting to a base station that’s advertising as having a different LAC), they’ll need to update their information. As a result, they’ll eventually respond to an <em>Identity Request</em> (the command that reveals a phone’s IMSI). It’s generally believed that CSSs advertise as having a different LAC than the one that corresponds to the area they’re in, allowing them to exploit this mechanism to force phones to hand over their IMSIs or connect to them.</p>
<p>All previously mentioned detection apps monitor for LAC changes. As Borgaonkar et al point out, one of them checks to see if the LAC matches that of neighbouring base stations, and displays a warning to the user when it’s close to the edge of an LA. Since LAC changes are common when the user is near the edge of a LA, these warnings are often false positives. Another app stores all LACs the phone has seen before, and sends out warnings whenever a new one appears, meaning false positive warnings are constantly sent out when the user travels to new places. Another app defaults to marking anything broadcasting a LAC value between 0-9 as suspicious. This is an example of how even though all the detection apps have heuristics for detecting if a base station is suspicious based on a determination that a required value (the LAC) is unusual, their interpretations of how to do this and their implementations vary so much that they produce different results.</p>
<p>Because we don’t have global standards for what’s normal, and because things vary so wildly by country, carrier, etc, it’s difficult to come up with heuristics that could universally work for detecting CSSs. As a result, the apps that have attempted to tackle this problem so far have ended up having dramatically different thresholds for alerts.</p>
<h3><a id="Defending"></a><strong>Section 4.3: Defending against CSSs</strong></h3>
<p>CSSs have such a wide range of capabilities (based on what we know about possible cell network attacks they could be based on) that there is no feasible way to defend against all of the things they can do. Defense should begin by considering what someone’s specific threat model is and coming up with ways to defend after that.</p>
<p><strong><em>Examples</em></strong></p>
<p>At the time of writing, there are no publicly known confirmed examples of CSSs being used by law enforcement for communication interception or service denial. However, there are <a href="https://www.detroitnews.com/story/news/local/detroit-city/2017/05/18/cell-snooping-fbi-immigrant/101859616/">quite</a> <a href="http://cnsmaryland.org/interactives/spring-2016/maryland-police-cell-phone-trackers/index.html">a few</a> <a href="https://shadowproof.com/2019/05/08/detroit-police-spent-more-than-half-million-dollars-on-cell-site-simulator-to-track-peoples-locations/">examples</a> of CSSs being used for location tracking.</p>
<p>Since the main threat CSSs pose is that of real time location tracking, and there are no adjustable user settings one can change to affect this, there are currently no immediate steps one can take to defend themselves against these devices, other than either not having a cell phone, (which isn’t a reasonable option for many of us) or turning off and/or leaving behind your phone when doing something important.</p>
<p>Despite that, there are many steps you can take to defend against online surveillance, many of which we’ve outlined in EFF’s <a href="https://ssd.eff.org/">Surveillance Self Defense Guide</a>.</p>
<h2><a id="Conclusion"></a>Conclusion: the past &amp; future of cell network security</h2>
<p>The intersection of cell networks, security, and user privacy has historically not been an accessible field, but that’s slowly changing. Each year there is more research in this field being published and open source projects (such as <a href="https://github.com/srsLTE/srsLTE">srsLTE</a>) that enable this research are improving dramatically—and more people are starting to question why more work isn’t being done to fix these issues.</p>
<p>Cell network security <a href="https://www.nytimes.com/2018/12/26/opinion/cellphones-security-spying.html">is broken in some pretty fundamental ways</a>. It’s up to all of us over the next few years to demand lawmakers pay closer attention to the issue, and to put pressure on standards groups, carriers, network operators, and vendors to make necessary improvements. Together, we can protect and defend users’ privacy.</p>
<h2><a id="References"></a>References</h2>
<p><em>IMSI-Catch Me If You Can: IMSI-Catcher-Catchers.</em> Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar Weippl. <a href="https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf">https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf </a>(Dabrowski et al, 2014)</p>
<p><em>IMSI Catcher Detection Apps Might Not Be All That Good, Research Suggests.</em> Joseph Cox. <a href="https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests">https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests</a></p>
<p><em>Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication</em>. Elad Barkan, Eli Biham, Nathan Keller. <a href="http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf">http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf </a>(Barkan et al, 2006)</p>
<p><em>Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.</em> Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi§and Jean-Pierre Seifert. <a href="https://arxiv.org/pdf/1510.07563.pdf">https://arxiv.org/pdf/1510.07563.pdf </a>(Shaik et al, 2017)</p>
<p><em>Practical Cellphone Spying</em>. Kristen Paget. Defcon 18. <a href="https://www.youtube.com/watch?v=fQSu9cBaojc">https://www.youtube.com/watch?v=fQSu9cBaojc </a>(Paget, 2010)</p>
<p><em>White-Stingray: Evaluating IMSI Catchers Detection Applications.</em> Ravishankar Borgaonkar, Andrew Martin, Shinjo Park, Altaf Shaik, Jean-Pierre Seifert. <a href="https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754">https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754 </a>(Borgaonkar et al, 2017)</p>
<h2>Notes</h2>
<ol>
<li id="fn1">The name “3GPP” is confusing since it contains “3G”. While they didn’t exist when GSM (a 2G technology) was originally being developed, they did later absorb some of the organizations that were responsible for developing GSM. It is still one of the main organizations that develops and maintains existing and future protocols. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref1" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn2">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref2" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn3">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref3" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn4">According to the Department of Justice, some CSSs can directly collect a subscriber’s phone number, meaning LE can skip the step of subpoenaing a service provider to obtain the subscriber’s phone number. See page 6 of https://www.eff.org/files/2015/11/30/illinois.dist_.ct_.stingrays.pdf. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref4" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn5">Generally, the network will first direct the message to the last known cell tower the phone was connected to, and that tower will send out a paging message to everyone listening on its paging frequency. If it doesn’t get a response, then it will spread out and try all the towers in a given Location Area, and so on. The exact details of how this works varies by type of data being routed (e.g. SMS vs phone call vs LTE data message) and by carrier. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref5" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn6">Basically, you compare the paging identities in the RRC messages sent out after each short call you initiate, and extract the value(s) that are repeated the number of times you placed calls. You can read a much more here in the R<em>evealing Identities</em> section here: <a href="https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf">https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf</a> <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref6" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn7">Note that Facebook messages have the advantage of not needing to know your target’s phone number to be able to trigger a notification being sent to their phone! (The attacker doesn’t need to be Facebook friends with their target either, as Facebook Messenger messages sent to strangers end up in the ‘Other’ folder, but still trigger LTE push notifications that aren’t displayed to the user.) <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref7" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
</ol>
</div>
</div>
</div>
</div>
</article>
</div>
<div class="panel-pane pane-entity-field pane-node-field-attachments">
<h2 class="pane-title">Downloads</h2>
<div class="field field--name-field-attachments field--type-file field--label-hidden">
<div class="field__items">
<div class="field__item even"><span class="file"><img decoding="async" class="file-icon" title="application/pdf" src="https://www.eff.org/modules/file/icons/application-pdf.png" alt="PDF icon" /> <a title="whitepaper_imsicatchers_eff.pdf" href="https://www.eff.org/files/2019/07/09/whitepaper_imsicatchers_eff_0.pdf" type="application/pdf; length=999909">Gotta Catch &#8216;Em All</a></span></div>
</div>
</div>
</div>
<p><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="editor-content title-wrap">
<h1 class="h1 ">Understanding and Detecting IMSI Catchers around the World</h1>
</div>
<p>One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less have a chance to prevent. Finding these unexpected attacks doesn’t just happen though, it requires experience and investigation, but most importantly it needs the mindset to dig deeper into any strange events that are encountered, and try to understand them, rather than just assuming they are random malicious events.</p>
<p>In this particular case, we are discussing IMSI Catchers. First off, the term IMSI catcher is a misused and sometimes contradictory term however. As explained <a href="https://www.eff.org/pages/cell-site-simulatorsimsi-catchers" target="_blank" rel="noopener">here</a>, there are actually 2 types of equipment that those in the public (and many in the industry) would conflate into what they would call IMSI catchers.</p>
<ul>
<li>‘Active’ IMSI Catchers, also termed Cell Site Simulators (CSS) or Fake Base Stations – these attempt to force local devices to connect to a Call Site Simulator, in order to decrypt the conversation and texts, and to execute man in the middle interception. These would be considered the more ‘traditional’ type of IMSI catchers most would be aware of. Stingrays are also a common term used for these (named after the brand built by Harris Corporation). A good overview of how the Active IMSI /Cell Site Simulators work is <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">here</a>.</li>
<li>Passive IMSI Catchers – these passively listen into the paging of mobile devices as they move and register to new real Cell towers in the local area, in order to get the IMSI numbers of these devices. They are far less precise, and are unable to do any of the more sophisticated type of interception, but involve no interaction between the mobile device and the IMSI Catcher. An overview of how these could work, and how they function is <a href="https://harrisonsand.com/posts/imsi-catcher/" target="_blank" rel="noopener">here</a>.</li>
</ul>
<picture class="wp-image-82879 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" /><img loading="lazy" decoding="async" class="entered lazyloaded" src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" sizes="(max-width: 800px) 100vw, 800px" srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" alt="two diagrams showing the difference between active IMSI Catcher and Passive IMSI Catcher" width="800" height="268" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" data-lazy-sizes="(max-width: 800px) 100vw, 800px" data-lazy-src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" data-ll-status="loaded" /></picture>
<p>The primary difference between these two is that the more traditional Active IMSI Catcher/CSSs always involves some form of interaction with the mobile device, whereas the Passive IMSI Catcher doesn’t – it literally just listens in to the paging that occurs in the local areas as the mobile device changes between legitimate cell towers in the vicinity. This makes a big difference when it comes to detection of these IMSI Catcher types.</p>
<p>A lot of research has gone into various ways of detecting Active IMSI Catchers, by looking at how they differ from real Cell towers. One distinctive example of what an Active IMSI Catcher might do is the forced downgrading of their target mobile device to use a less secure radio interface. This detection of an Active IMSI Catchers can be difficult, involves a lot of local measurements and often can and has in the past led to false positives, but it gives some results. From the attacker’s perspective it’s also a trade-off in that they must make the effort to physically deploy an Active IMSI Catchers in a sensitive area, and then hope its radio activity doesn’t give it away. This is often why more sophisticated attackers may often resort to using attacks over signalling interfaces such as SS7 and Diameter to achieve their aims, which can be sent from any part of the world.</p>
<p>A Passive IMSI Catcher changes things somewhat. It still involves physical deployment of a system to listen in the local targeted area, but it is essentially undetectable on the radio interface, as it emits nothing that would allow it to be detected. This makes it very valuable to perform long-term surveillance in sensitive areas, when the goal is to have the least chance of being detected, while still trying to determine the IMSIs of who is in the local area.</p>
<p>The issue with both types of IMSI Catchers, from the attacker’s perspective, is that what they are left with are a collection of IMSIs from around the world. While this information may be useful, often you need more information to profile who has been ‘caught’. For Active IMSI Catcher deployments; the attackers may also intercept calls/text messages etc, so have a better idea of the target, but for passive IMSI catchers they won’t have that. What the attackers really need is the co-corresponding phone number – the MSISDN of the mobile device associated with the IMSI – in order to truly figure out the identities of the mobile device their IMSI catcher has caught.</p>
<p>This is where our analysis and investigation has come in. Over time, we have been seeing patterns of unusual requests over the SS7 interface, for particular IMSIs. Specifically, what we have been seeing is our Signalling Firewalls, deployed at multiple customer mobile operators, receiving suspicious MAP_RESTORE_DATA packets for IMSIs from unexpected sources. A MAP_RESTORE_DATA packet is a particular command that requests that the home operator sends details for a particular IMSI to the roamed-to network. Details in this case includes MSISDN (the actual phone number), call forwarding setting and other specific information. Further investigation showed that we always received this command when these IMSIs were near or attached to specific Cell Sites while roaming in a 3rd country and nowhere else.</p>
<picture class="wp-image-82881 aligncenter"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21343" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp" alt="" width="1536" height="662" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-400x172.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-1024x441.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-768x331.webp 768w" sizes="(max-width: 1536px) 100vw, 1536px" /></picture> <picture class="wp-image-82881 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" /></picture>
<p>Our working theory, is that what we are observing is what we now call “<strong>IMSI Profilers</strong>”. These IMSI Profilers work in conjunction with IMSI Catchers – they take the list of IMSIs that have been detected and request profile information, in order to feed these phone numbers back to the IMSI catcher operator. The sequence of events that we believe to happen is shown above. From log analysis it also seems likely (but can’t be confirmed 100%) that the IMSI Catcher in the 3rd country is of the passive variety. In this particular case, the IMSI Profiler is using a source SS7 address (called a SCCP Global Title or GT) in a small European mobile operator that we have detected previously in our SIGIL/Signalling Intelligence system to be used by multiple surveillance companies, further confirming our suspicion that it is malicious.</p>
<p>Regardless of the IMSI catcher type used, this method of analysing incoming suspicious signalling activity gives the opportunity for mobile operators to partially protect their subscribers against IMSI Catchers around the world, something they didn’t have in the past. It won’t stop an Active IMSI Catcher from forcing a subscriber to connect to them, but it would stop additional information being retrieved. And in the case of passive IMSI catcher it is potentially one of the <strong>only ways</strong> to detect these remotely and block any more useful information being obtained.</p>
<p>In the long term, improvements in the new 5G radio and core network standards means that mobile operators should be able to greatly improve the ability to block IMSI Catchers over 5G. If these are implemented correctly and no loopholes are introduced then effective 5G IMSI Catchers may never arise. In the interim however, IMSI Catchers – both Passive and Active – are being used globally in the world to track and record individuals without their consent. By analysing incoming signalling traffic, and detecting and blocking these IMSI Profilers, mobile operators now have the opportunity to help protect their subscribers globally, regardless of how stealthy the IMSI Catcher is. <a href="https://www.enea.com/insights/adaptive-mobile-imsi-catchers/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="et_pb_row et_pb_row_1_tb_body">
<div class="et_pb_column et_pb_column_3_5 et_pb_column_3_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_title et_pb_post_title_0_tb_body et_pb_bg_layout_light et_pb_text_align_left">
<div class="et_pb_title_container">
<h1 class="entry-title">How to Catch an IMSI Catcher</h1>
</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_1_tb_body article-excerpt et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">IMSI catchers, or fake antennas, are a common cell phone surveillance method. The FADe project helped local NGOs in Latin America detect and document these devices.</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_3_tb_body et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner"></div>
</div>
</div>
</div>
<div class="et_pb_row et_pb_row_2_tb_body">
<div class="et_pb_column et_pb_column_4_4 et_pb_column_4_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body news-body">
<h2 class="wp-block-heading"><strong>Civil Society Needs Help Catching IMSI Catchers </strong></h2>
<p>Law enforcement, criminals, and repressive governments monitor cell phone signals for the purpose of counter-terrorism, espionage, or political persecution. One common surveillance method is the placement of fake antennas—or <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#BackgroundInfo" target="_blank" rel="noreferrer noopener">IMSI catchers</a>—which imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>In a high-profile example, <a href="https://nomada.gt/pais/la-corrupcion-no-es-normal/espionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i/" target="_blank" rel="noreferrer noopener">a Guatemalan investigation revealed</a> large-scale <a href="https://www.eff.org/deeplinks/2018/12/where-government-hack-their-own-people-and-people-fight-back-latin-american" target="_blank" rel="noreferrer noopener">illegal spying</a> targeting “activists, entrepreneurs, politicians, journalists, diplomats, and social leaders.” Many governments engage in similar practices, often <a href="https://privacyinternational.org/strategic-areas/contesting-government-data-and-system-exploitation" target="_blank" rel="noreferrer noopener">without any meaningful oversight</a> or accountability.</p>
<p>The battle against authoritarian or illegal spying demands a range of methodologies—from legal policies and telecommunications regulations to physical interventions like “Faraday bags,” which shield devices in a casing that blocks electromagnetic transmissions. But the fight between eavesdroppers and victims (often human rights defenders) is not an even one. Most civil society organizations lack the equipment or expertise to effectively monitor phone surveillance.</p>
<h2 class="wp-block-heading"><strong>Equipping Civil Society with Resources to Expose Surveillance</strong></h2>
<p>To help Latin American NGOs level the playing field, <a href="http://www.southlighthouse.org/" target="_blank" rel="noreferrer noopener">South Lighthouse</a> created the <a href="http://fadeproject.org/" target="_blank" rel="noreferrer noopener">Fake Antenna Detection project (FADe)</a>, with support from Open Technology Fund’s <a href="https://www.opentech.fund/funds/internet-freedom-fund/" target="_blank" rel="noreferrer noopener">Internet Freedom Fund</a>. The project’s primary focus was detecting and documenting IMSI catchers—surveillance devices that imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>The FADe team provided training, equipment, and other support to enable local partners to scan for IMSI catchers, analyze their findings and, ideally, make use of the results for advocacy. “A fundamental principle of the program has been partnership and capacitation,” says Andrés Schiavi, Executive Director of South Lighthouse.</p>
<p>FADe’s technology coordinator, Carlos Guerra says, “We wanted to open up a discussion for NGOs about how cell technology works and about how it <em>should</em> work to ensure optimal benefits to people’s safety and people’s rights.”</p>
<p>Using methods initially developed by the <a href="https://seaglass.cs.washington.edu/" target="_blank" rel="noreferrer noopener">SEAGLASS</a> project at the University of Washington and the <a href="https://www.eff.org/pages/crocodile-hunter" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation (EFF)</a>, FADe partners assembled simple sensors using a few off-the-shelf electronics, a smartphone, and a “feature phone” (a basic device resembling an early mobile phone that is usually more affordable and durable than a smartphone). The sensor setup sits in a moving vehicle and collects signal information over several weeks from local cell towers.</p>
<p>By analyzing the resulting data, groups can differentiate between signals consistent with legitimate cell towers and signals showing anomalous behaviors, such as a “tower” that changes locations (see animation below); or only operates during certain times; or uses frequencies or signal parameters not used anywhere else in the network. Another common warning sign is suspicious instructions sent to a device, such as a request to disconnect from all other towers, or a command to downgrade from 3G or 4G to a 2G network, which will make the device more vulnerable to surveillance.</p>
<p><em>A specific cell tower physically moving among different locations is one of the anomalous behaviors that can help identify an IMSI-catcher.</em></p>
<p>But analysis of these signals can be tricky, says Guerra. “There is no cookie-cutter method,” he says. The data is “noisy,” and cell providers configure their towers differently. It takes many days of monitoring to set a baseline that helps distinguish between legitimate and fake antennas.</p>
<p>The FADe team began working with local organizations in 2018. To mitigate technical and security risks, Schiavi says the first FADe partners were drawn from among South Lighthouse’s network of Latin American organizations. But interest grew rapidly, he says, in part because nothing comparable to the FADe/SEAGLASS approach had ever been available to these organizations. From 2019 to 2022, FADe worked with partners in <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">nine different countries</a>, documenting signals from almost 9,000 antennas, catching more than 150 likely IMSI-catchers.</p>
<p>One of FADe’s local partners, a digital security specialist from Nicaragua, says he was familiar with FADe in 2018 when he read the bombshell reports about Guatemalan surveillance. “The media found the police were using an IMSI-catcher,” he says. “We have known about methods like this in Central America, but we never had the evidence. I said, ‘We need to monitor that. I need to bring this to Nicaragua.&#8217;”</p>
<h2 class="wp-block-heading"><strong>Some of the Findings</strong></h2>
<p>The results in Nicaragua revealed <a href="https://fadeproject.org/?project=managua-2g-2" target="_blank" rel="noreferrer noopener">23 antennas around Managua</a> with anomalies that indicated the presence of an IMSI catcher. The local partner (who is remaining anonymous for security reasons) says the findings informed a wider discussion in Nicaragua about telephone eavesdropping. Although it was common knowledge that the government had an “open door” from the national ISP to eavesdrop online, the FADe data drove new public scrutiny and <a href="https://confidencial.digital/english/39-fake-antennas-discovered-monitoring-cell-phones-in-nicaragua/" target="_blank" rel="noreferrer noopener">media coverage</a> about the use of fake antennas.</p>
<p>Among the other FADe sites, <a href="https://www.reuters.com/article/us-mexico-tech-rights-trfn-analysis/birds-on-the-wire-concerns-over-mexico-cell-phone-surveillance-idUSKBN23J2CC/" target="_blank" rel="noreferrer noopener">Mexico</a> and <a href="https://openinternet.global/news/reality-digital-authoritarianism-venezuela" target="_blank" rel="noreferrer noopener">Venezuela</a> recorded an especially high number of fake antennas, as experts from <a href="https://poderlatam.org/" target="_blank" rel="noreferrer noopener">PODER</a> recounted <a href="https://www.washingtonpost.com/es/post-opinion/2020/05/31/datos-y-llamadas-de-celulares-en-riesgo-de-espionaje-por-antenas-falsas-en-america-latina/" target="_blank" rel="noreferrer noopener">in the Washington Post</a> (ES). Data from Caracas, Venezuela, showed <a href="https://fadeproject.org/?project=caracas" target="_blank" rel="noreferrer noopener">33 different devices</a> with irregular readings that could indicate IMSI-catchers. In Buenos Aires, Argentina, out of 1,000 cell towers monitored, <a href="https://fadeproject.org/?project=buenos-aires-2g&amp;lang=es" target="_blank" rel="noreferrer noopener">suspicious patterns</a> were found in 17 antennas, with most concentrated around the downtown and university areas. Notably, the suspicious antennas found in Buenos Aires were all on the 2G network, with no irregularities seen in the <a href="https://fadeproject.org/?project=buenos-aires-4g" target="_blank" rel="noreferrer noopener">smaller group</a> of devices on the 4G network, which is known to be harder to surveil. For summaries of the observations in all locations, see the project’s <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">results section</a>.  <a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<blockquote class="wp-embedded-content" data-secret="CwUzk2Zogw"><p><a href="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/">Cell-site simulators/ imsi catchers aka Stingray phone tracker</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Cell-site simulators/ imsi catchers aka Stingray phone tracker&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/embed/#?secret=QHM7OzueSq#?secret=CwUzk2Zogw" data-secret="CwUzk2Zogw" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Pacamarra: IMSI catcher intercepts calls, not personal data | Morning Matters" width="640" height="360" src="https://www.youtube.com/embed/fTCnf6mAgxk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="RayHunter - Building the EFFs IMSI Catcher Detector" width="640" height="360" src="https://www.youtube.com/embed/SbSYSNuAetI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="NDSS 2025 - Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic" width="640" height="360" src="https://www.youtube.com/embed/jY3idyn11Tc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="DICT: IMSI catchers may operate in public spaces, tracking, intercepting mobile communications | ANC" width="640" height="360" src="https://www.youtube.com/embed/iUIcCMG30ZY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cell-site simulators/ imsi catchers aka Stingray phone tracker</title>
		<link>https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 21:49:24 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Cell-site simulators/ imsi catchers]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21346</guid>

					<description><![CDATA[Cell-site simulators/ imsi catchers aka Stingray phone tracker Cell-site simulators/ imsi catchers Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. Cell-site simulators operate by conducting a general search of all cell phones within [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Cell-site simulators/ imsi catchers aka <span class="mw-page-title-main">Stingray phone tracker</span></h2>
<p><iframe title="5G IMSI Catchers Mirage5G IMSI Catchers Mirage" width="640" height="360" src="https://www.youtube.com/embed/Bg1HVaw1Sm4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Cell-site simulators/ imsi catchers</h2>
<div dir="ltr">
<div class="content">
<p>Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that<a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream"> masquerade as legitimate cell-phone towers</a>, tricking phones within a certain radius into<a href="https://www.justice.gov/opa/file/767321/download"> connecting to the device rather than a tower</a>.</p>
<p>Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.  Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies and without needing to involve the phone company at all. Cell-site simulators can also log IMSI numbers, (International Mobile Subscriber Identifiers) unique to each SIM card, of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications.</p>
</div>
</div>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div dir="ltr">
<div class="content">
<h3><span style="color: #008080;"><a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener"><span style="color: #0000ff;">DOWNLOAD</span></a> IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3>How Cell-Site Simulators Work</h3>
<h4>Standard Communication</h4>
<p>Cellular networks are distributed over geographic areas called &#8220;cells.&#8221; Each cell is served by one transceiver, also known as a cell-site or base station. Your phone naturally connects with the closest base station to provide you service as you move through various cells.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21348" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png" alt="" width="700" height="373" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2-400x213.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption"></div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Generally, there are two types of device used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers), and active devices (which we will call cell-site simulators.) Passive devices, as a rule, do not transmit any signals. They work by plucking cellular transmissions out of the air, the same way an FM radio works. They then decode (and sometimes decrypt) those signals to find the IMSI of the mobile device and track it.</p>
<p>Active cell-site simulators are much more commonly used by law enforcement, and work very differently from their passive cousins. Cellular devices are designed to connect to the cell site nearby with the strongest signal. To exploit this, cell-site simulators broadcast signals that are either stronger than the legitimate cell sites around them, or are made to appear stronger. This causes devices within range to disconnect from their service providers’ legitimate cell sites and to instead establish a new connection with the cell-site simulator. Cell-site simulators can also take advantage of flaws in the design of cellular protocols (such as 2G/3G/4G/5G) to cause phones to disconnect from a legitimate cell-site and connect to the cell-site simulator instead.  For the purposes of this article we will focus on active cell-site simulators.</p>
<p>It is difficult for most people to know whether or not their phone’s signals have been accessed by an active cell-site simulator, and it is impossible for anyone to know if their phone’s signals have been accessed by a passive IMSI catcher. Apps for identifying the use of cell-site simulators, such as SnoopSnitch, may not be verifiably accurate. Some more advanced tools have been built, which may be more accurate. For instance, security researchers at the University of Washington have<a href="https://seaglass.cs.washington.edu/"> designed a system to measure the use of cell-site simulators across Seattle</a>, and EFF researchers <a href="https://github.com/EFForg/crocodilehunter/">have designed a similar system</a>.</p>
<h3>What Kinds of Data Cell-Site Simulators Collect</h3>
<p>Data collected by cell-site simulators can reveal intensely personal information about anyone who carries a phone, whether or not they have ever been suspected of a crime.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21349" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png" alt="" width="700" height="438" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3-400x250.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption">Cell-site simulator surveillance: Cell-site simulators trick your phone into thinking they are base stations.</div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Once your cellular device has connected to a cell-site simulator, the cell-site simulator can determine your location and trigger your device to transmit its  IMSI for later identification. If the cell-site simulator is able to downgrade the cellular connection to a 2G/GSM connection then it can potentially perform much more intrusive acts such as intercepting call metadata (what numbers were called or called the phone and the amount of time on each call),<a href="https://www.justice.gov/sites/default/files/criminal/legacy/2014/10/29/elec-sur-manual.pdf"> the content of unencrypted phone calls and text messages</a> and some types of data usage (such as websites visited).  Additionally, marketing materials produced by the manufacturers of cell-site simulators indicate that they<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> can be configured</a> to divert calls and text messages, edit messages, and even spoof the identity of a caller in text messages and calls on a 2G/GSM network.</p>
<h3>How Law Enforcement Uses Cell-Site Simulators</h3>
<p>Police can use cell-site simulators to try to locate a person when they already know their phone’s identifying information, or to gather the IMSI (and later the identity) of anyone in a specific area. Some cell-site simulators are small enough to fit in a police cruiser, or even on the vest of an officer, allowing law enforcement officers to drive to multiple locations, capturing from every mobile device in a given area—in some cases<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> up to 10,000 phones</a> at a time. These indiscriminate, dragnet searches include phones located in traditionally protected private spaces, such as homes and doctors’ offices.</p>
<p>Law enforcement officers have used information from cell-site simulators to investigate major and minor crimes and civil offenses.<a href="https://www.usatoday.com/story/news/2015/08/23/baltimore-police-stingray-cell-surveillance/31994181/"> Baltimore Police, for example,</a> have used their devices for a wide variety of purposes, ranging from tracking a kidnapper to trying to locate a man who took his wife’s phone during an argument (and later returned it to her).<a href="https://gizmodo.com/maryland-police-used-an-indiscriminate-cellphone-spy-to-1774831661"> In one case</a>, Annapolis Police used a cell-site simulator to investigate a robbery involving $56 worth of submarine sandwiches and chicken wings. In Detroit,<a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays"> U.S. Immigration and Customs Enforcement used a cell-site simulator</a> to locate and arrest an undocumented immigrant. In California, the San Bernardino county sheriff&#8217;s office <a href="https://arstechnica.com/tech-policy/2018/10/eff-sues-county-sheriff-claims-agency-wont-give-up-stingray-related-records/">used their cell-site simulator over 300 times in a little over a year</a>.</p>
<p>Police may have deployed cell-site simulators at protests. The Miami-Dade Police Department apparently<a href="http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf"> first purchased a cell-site simulator in 2003 to surveil protestors at a Free Trade of the Americas Agreement conference</a>. And it is suspected that they have been used <a href="https://www.law.georgetown.edu/american-criminal-law-review/wp-content/uploads/sites/15/2022/02/59-1-Owsley-George_Floyd_General_Warrants.pdf">more recently than that </a>during protests against police violence in 2020.</p>
<p>Cell-site simulators<a href="http://www.vocativ.com/389656/stingray-devices-in-trumps-america/"> are used</a> by the FBI, DEA, NSA, Secret Service, and ICE, as well as the U.S. Army, Navy, Marine Corps, and National Guard. U.S. Marshals and the FBI <a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">have attached cell-site simulators to airplanes</a> to track suspects, gathering massive amounts of data about many innocent people in the process. The<a href="https://www.texasobserver.org/texas-national-guard-spying-devices-surveillance/"> Texas Observer</a> also uncovered airborne cell-site simulators in use by the Texas National Guard. In 2023 it was revealed that ICE, DHS, and the Secret Service have all <a href="https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones">used cell-site simulators many times without following their own rules on deployment or getting a warrant</a>.</p>
<p>A<a href="https://www.eff.org/deeplinks/2017/02/bipartisan-congressional-oversight-committee-wants-probable-cause-warrants-0"> recent Congressional Oversight Committee report</a> called on Congress to pass laws requiring a warrant before using cell-site simulators. Some states,<a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa"> such as California</a>, already require a warrant, except in emergency situations.</p>
<h3>Who Sells Cell-site Simulators</h3>
<p>Harris Corporation is the most well known company providing cell-site simulators to law enforcement. Their Stingray product has become the catchphrase for these devices, but they have subsequently introduced other models, such as Hailstorm,<a href="https://www.documentcloud.org/documents/3105805-Arrowhead-1-0-1-Release-Notes.html"> ArrowHead</a>,<a href="https://www.documentcloud.org/documents/3105793-Gemini-3-3-Quick-Start-Guide.html"> AmberJack, and KingFish</a>. Harris has stopped selling cell-site simulator technology to local law enforcement agencies but still works with the federal government. Digital Receiver Technology, a division of Boeing, is also a common supplier of the technology, often referred to as “<a href="https://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/">dirtboxes</a>.”</p>
<p>Other sellers of cell-site simulators include Keyw, Octastic, Tactical Support Equipment, Berkeley Varitronics, Cogynte, X-Surveillance, Atos, Rayzone, Martone Radio Technology, Septier Communication, PKI Electronic Intelligence, Datong (Seven Technologies Group), Ability Computers and Software Industries, Gamma Group, Rohde &amp; Schwarz, Meganet Corporation. Manufacturers<a href="http://www.septier.com/law-enforcement/"> Septier</a> and<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> Gamma GSM</a> both provide information on what the devices can capture. The Intercept published a<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> secret, internal U.S. government catalogue</a> of various cellphone surveillance devices, as well as an<a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/"> older cell-site simulator manual</a> made available through a Freedom of Information Act request.</p>
<h3>Threats Posed by Cell-Site Simulators</h3>
<p>Cell-site simulators invade the privacy of everyone who happens to be in a given area, regardless of the fact that the vast majority have not been accused of committing a crime. These are <a href="https://www.hoover.org/sites/default/files/research/docs/lynch_webreadypdf.pdf">general searches</a> that violate the Fourth Amendment requirement that warrants “particularly” describe who or what is to be searched.</p>
<p>The use of cell-site simulators have been shrouded in government secrecy. Police have used cell-site simulators to track location data without a warrant, by deceptively obtaining “pen register” orders from courts without explaining the true nature of the surveillance. In Baltimore, a judge concluded that law enforcement had <a href="https://www.aclu.org/other/state-v-andrews-stingray-june-4-2015-transcript?redirect=state-v-andrews-stingray-june-4-2015-transcript">intentionally withheld the information</a> from the defense, in violation of their legal disclosure obligations. For a while, police departments tried to keep the use of cell-site simulators secret from not just the public but also the court system, withholding information from defense attorneys and judges—likely due in part to<a href="http://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html"> non-disclosure agreements</a> with Harris Corporation. Prosecutors have<a href="https://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html"> accepted plea deals</a> to hide their use of cell-site simulators and have even<a href="http://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/"> dropped cases</a> rather than revealing information about their use of the technology. U.S. Marshalls have<a href="https://arstechnica.com/tech-policy/2014/06/us-marshals-step-in-thwart-efforts-to-learn-about-cell-tracking-devices/"> driven files hundreds of miles</a> to thwart public records requests. Police have <a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream">tried to keep information secret</a> in Sarasota, Florida, Tacoma, Washington,<a href="https://arstechnica.com/tech-policy/2014/11/prosecutors-drop-key-evidence-at-trial-to-avoid-explaining-stingray-use/"> Baltimore, Maryland</a>, and St. Louis, Missouri.</p>
<p>To preserve this secrecy, the<a href="https://theintercept.com/2016/05/05/fbi-told-cops-to-recreate-evidence-from-secret-cell-phone-trackers/"> FBI told police officers to recreate evidence</a> from the devices, according to a document obtained by the nonprofit investigative journalism outlet Oklahoma Watch.</p>
<p>Cell-site simulators often disrupt cell phone communications within as much as a<a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/"> 500-meter radius</a> of the device, interrupting important communications and even <a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/">emergency phone calls</a>.  Cell-site simulators have been shown to disproportionately affect low-income communities and communities of color. In Baltimore, the use of cell-site simulators disproportionately impacted African-American communities, according to a map included in an <a href="https://www.eff.org/deeplinks/2016/08/civil-liberties-groups-file-fcc-complaint-arguing-baltimore-police-are-illegally">FCC complaint</a> that overlaid where Baltimore Police were using stingrays over census data on the city’s black population.</p>
<p><a href="https://www.eff.org/deeplinks/2018/08/blog-post-wyden-911-disruption-css">Cell-site simulators can also disrupt emergency calls</a>, such as 911 in the US, making them not only a menace to privacy but to public safety as well.</p>
<p>Cell-site simulators rely on vulnerabilities in our communications system that the government should help fix rather than exploit.</p>
<h3>EFF’s Work on Cell-Site Simulators</h3>
<p>For the reasons above, EFF opposes police use of cell site simulators. Insofar as law enforcement agencies are using cell-site simulators in criminal investigations, EFF argues that use should be limited in the following ways:</p>
<ol>
<li>Law enforcement should obtain individualized warrants based on probable cause;</li>
<li>Cell-site simulators should only be used for serious, violent crimes;</li>
<li>Cell-site simulators should only be used for identifying location of a particular phone;</li>
<li>Law enforcement must minimize the collection of data from people who are not the targets of the investigation.</li>
<li>Companies making cell-site simulators must confirm that their technology does not disrupt calls to emergency services.</li>
</ol>
<h4>Litigation</h4>
<p>We <a href="https://www.eff.org/press/releases/eff-files-foia-suit-over-us-marshals-spy-planes">filed a Freedom of Information Act lawsuit</a> to expose and shine light on the U.S. Marshals Service’s use of cell-site simulators on planes.</p>
<p>Along with the ACLU and ACLU of Maryland, we <a href="https://www.eff.org/deeplinks/2015/12/eff-joins-aclu-amicus-brief-supporting-warrant-requirement-cell-site-simulators">filed an amicus brief</a> in the first case in the country where a judge threw out evidence obtained as a result of using a cell-site simulator without a warrant.</p>
<p>We filed an amicus brief, along with the ACLU, pointing a court to facts indicating that the Milwaukee Police Department secretly used a cell-site simulator to locate a defendant through his cell phone without a warrant in U.S. vs. Damian Patrick. (The government then <a href="https://www.eff.org/document/us-v-patrick-government-letter-admitting-stingray-use">admitted</a> to having used it.)</p>
<h4>Legislation</h4>
<p>We were original co-sponsors of the <a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa">California Electronic Communications Privacy Act (CalECPA)</a>, along with the ACLU and the California Newspaper Publisher Association. This law requires California police to get a warrant before using a cell-site simulator. Any evidence obtained from a cell-site simulator without a warrant is inadmissible in court.</p>
<p>EFF supported S.B. 741, which requires transparency measures regarding the use of cell-site simulators. We <a href="https://www.eff.org/deeplinks/2016/04/here-are-79-policies-california-surveillance-tech-where-are-other-90">collected many of these policies</a>.</p>
<h4>Further Research</h4>
<p>We have written a report on the <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks">technical means possibly used by cell-site simulators called “Gotta Catch ‘em All”</a>, and we have developed a proof of concept technical means of <a href="https://github.com/EFForg/crocodilehunter">detecting cell-site simulators called Crocodile Hunter</a>.</p>
<h3>EFF Cases</h3>
<p><a href="https://www.eff.org/cases/state-maryland-v-kerron-andrews">State of Maryland v. Kerron Andrews</a></p>
<p><a href="https://www.eff.org/cases/us-v-damian-patrick">U.S. v. Damian Patrick</a></p>
<p><a href="https://www.eff.org/cases/us-marshals-airborne-imsi-catchers">EFF v. U.S. Department of Justice</a></p>
<h3><strong>Suggested Additional Reading</strong></h3>
<p><a href="https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices-whos-got-them">Stingray Tracking Devices: Who&#8217;s Got Them?</a> (ACLU)</p>
<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678">Your Secret Stingray&#8217;s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy</a> (Harvard Journal of Law and Technology)</p>
<p><a href="https://oversight.house.gov/hearing/examining-law-enforcement-use-of-cell-phone-tracking-devices/">Examining Law Enforcement Use of Cell Phone Tracking Devices</a> (House Oversight Committee)</p>
<p><a href="http://centerformediajustice.org/resources/the-relentless-eye/">The Relentless “Eye” Local Surveillance: Its Impact on Human Rights and Its Relationship to National and International Surveillance</a> (Center for Media Justice and others)</p>
<p><a href="https://www.justice.gov/opa/file/767321/download">Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology</a> (U.S. Department of Justice)</p>
<p><a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/">Long-Secret Stingray Manuals Detail How Police Can Spy on Phones</a>  (The Intercept)</p>
<p><a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/">A Secret Catalogue of Government Gear for Spying on Your Cellphone</a> (The Intercept)</p>
<p><a href="https://gizmodo.com/american-cops-turns-to-canadian-phone-tracking-firm-aft-1845442778">Cops Turn to Canadian Phone-Tracking Firm After Infamous &#8216;Stingrays&#8217; Become &#8216;Obsolete&#8217;</a> (Gizmodo)</p>
</div>
</div>
<p><a href="https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<div id="tm-row-687d638d57d7d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58012" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d582dd" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">IMSI Catcher System</h4>
</div>
<div id="tm-spacer-687d638d58705" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Cellular Interception Solutions help law enforcement authorities to acquire, intercept, analyze and manage cellular communications such as voice, SMS, and Call Related Information (CRI) data. This becomes vital as terrorists and criminal elements rely upon cellular mobile communications to carry out their subversive operations.</p>
<p>The initial step in the interception of any phone is identifying the presence of target phones in the areas of interest. This can be achieved using IMSI-Catcher. IMSI Catcher Systems are designed to collect basic identities (IMSI, IMEI) of 2G, 3G, and 4G mobile phones working within their coverage area without the knowledge of the service providers and the phone users. This enables the agencies to identify the presence of the target in their area of operation. These phones can then be intercepted by Passive, Semi-Active, or Hybrid Interception systems.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5895d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58b4f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d58d40" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d58e24" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d590a0" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="imsi_contact" class="tm-button-wrapper tm-animation move-up animate"><a class="tm-button style-flat tm-button-nm tm-button- has-icon icon-right" href="https://www.stratign.com/gsm-interception-system-v2/"><span class="button-text" data-text="Contact">Contact </span><i class="fa fa-phone-square"></i></a></div>
<div id="tm-spacer-687d638d59451" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59563" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5977f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d599fb" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Passive GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d59e54" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Passive GSM Interception System is the most advanced monitoring system that does not transmit any information, hence making it completely undetectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d59f14" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59fdc" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a1c4" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21350" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="715" height="455" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1304.png 2048w" sizes="(max-width: 715px) 100vw, 715px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5a4d5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a6dc" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5a934" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>System is completely passive, and its presence cannot be detected either by the target or by the service provider.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Capable of intercepting calls and messages.</li>
<li>Location of targets can be displayed on a digital map</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Real-time passive deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>System stores intercepted voice calls, SMS, and protocol information on the control PC hard drive.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Print Analysis, Link analysis.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5af4e" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5b1de" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5b36c" class="tm-spacer"></div>
<div id="tm-heading-687d638d5b46a" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Semi-Active GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5b8ad" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Semi-Active GSM Interception System can intercept incoming and outgoing communications between the Base Station, and the Mobile Handset using the principle of Man-in-the-Middle, without being detectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d5b96f" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5ba45" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5bc44" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21351" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="865" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 865px) 100vw, 865px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5beb6" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5c149" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5c3d3" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>Interception does not require the service provider’s assistance or SIM for operation.</li>
<li>Real-time listening of the intercepted cell phone calls.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Real-time deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>Capable of intercepting voice, SMS, and Call Related Information (CRI) data.</li>
<li>Location of targets can be determined with an accuracy for up to 5 meters.</li>
<li>Handheld direction finder for better location accuracy</li>
<li>Selective jamming capability using which the operator can disable certain services of the target like outgoing call, incoming call, SMS, etc.</li>
<li>Spoofing and manipulating Text Messages and Calls.</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Forensics, Keyword Spotting.</li>
</ul>
</div>
</div>
<div id="tm-spacer-687d638d5c8bb" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5c9a5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5cbf8" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5cd57" class="tm-spacer"></div>
<div id="tm-heading-687d638d5cdf7" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Hybrid GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5d1f8" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Hybrid GSM Interception system is a combination of Passive and Semi-Active interception systems. The basic functioning of the system is like the passive system and is turned into an active one only when required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d378" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d593" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21352" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="774" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 774px) 100vw, 774px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d82b" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d9eb" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5dbb8" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>In Passive Mode all features of the passive system will apply.</li>
<li>In Semi-Active Mode all features of the Semi-Active Mode system will apply. <a href="https://www.stratign.com/gsm-interception-system-v2/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<hr />
<h1 class="entry-title">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic</h1>
<p><strong>Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni (ETH Zurich), Srdjan Capkun (ETH Zuerich), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</strong></p>
<p>&nbsp;</p>
<p>IMSI-Catchers allow parties other than cellular network providers to covertly track mobile device users. While the research community has developed many tools to combat this problem, current solutions focus on correlated behavior and are therefore subject to substantial false classifications. In this paper, we present a standards-driven methodology that focuses on the messages an IMSI-Catcher textit{must} use to cause mobile devices to provide their permanent identifiers. That is, our approach focuses on causal attributes rather than correlated ones. We systematically analyze message flows that would lead to IMSI exposure (most of which have not been previously considered in the research community), and identify 53 messages an IMSI-Catcher can use for its attack. We then perform a measurement study on two continents to characterize the ratio in which connections use these messages in normal operations. We use these benchmarks to compare against open-source IMSI-Catcher implementations and then observe anomalous behavior at a large-scale event with significant media attention. Our analysis strongly implies the presence of an IMSI-Catcher at said public event ($p &lt;&lt; 0.005$), thus representing the first publication to provide evidence of the statistical significance of its findings. <a href="https://www.ndss-symposium.org/ndss-paper/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<blockquote class="wp-embedded-content" data-secret="148xCekYPH"><p><a href="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Detecting IMSI Catchers: Tools, Apps and Methods You Should Know&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/embed/#?secret=adQrYGaIcF#?secret=148xCekYPH" data-secret="148xCekYPH" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESP32-DIV: Your Swiss Army Knife for Wireless Networks</title>
		<link>https://goodshepherdmedia.net/esp32-div-your-swiss-army-knife-for-wireless-networks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 20:12:18 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[ESP32-DIV]]></category>
		<category><![CDATA[ESP32-DIV Your Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks]]></category>
		<category><![CDATA[Hacking Wireless Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21116</guid>

					<description><![CDATA[ESP32-DIV: Your Swiss Army Knife for Wireless Networks ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks Hardware of ESP32-DIV The ESP32-DIV is a compact yet powerful device, built from two main sections: the Main Board and the Shield. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components. 🛠️ Main Board [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<blockquote>
<h4><span style="color: #0000ff;">ESP32-Div: An ESP32 Based Swiss Army Knife for Wireless Networks</span></h4>
</blockquote>
<div class="markdown-heading">
<h1 class="heading-element">Hardware of ESP32-DIV</h1>
<p><iframe title="ESP32 DIV DIY INSTALLATION @techcifer" width="640" height="360" src="https://www.youtube.com/embed/AR7GJnTj3u0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p>The <strong>ESP32-DIV</strong> is a compact yet powerful device, built from two main sections: the <strong>Main Board</strong> and the <strong>Shield</strong>. Together, they enable Wi-Fi, BLE, 2.4GHz, and Sub-GHz operations. Below is a breakdown of the hardware components.</p>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Main Board</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>LF33</strong>: Voltage regulator providing a stable 3.3V supply for reliable operation.</li>
<li><strong>TP4056</strong>: Lithium battery charger with built-in protection for safe battery management.</li>
<li><strong>CP2102</strong>: USB-to-serial converter for flashing firmware and serial communication.</li>
<li><strong>PCF8574</strong>: I/O expander to manage multiple button inputs for user interaction.</li>
<li><strong>SD Card Slot</strong>: Stores captured signals, logs, and configurations.</li>
<li><strong>ESP32-U (16MB)</strong>: The core microcontroller with Wi-Fi and BLE capabilities, featuring 16MB flash memory.</li>
<li><strong>Antenna Connector</strong>: Supports external antennas for enhanced signal range.</li>
<li><strong>ILI9341 TFT Display</strong>: 2.8-inch screen for user interface and real-time data visualization.</li>
<li><strong>Push Buttons</strong>: For navigating menus and interacting with the device.</li>
</ul>
<div class="markdown-heading">
<h2 class="heading-element"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Shield</h2>
<p>&nbsp;</p>
</div>
<ul>
<li><strong>3 x NRF24 Modules</strong>: Enable 2.4GHz operations, including scanning, jamming, and protocol analysis.</li>
<li><strong>CC1101 Module</strong>: Sub-GHz transceiver for replay attacks, jamming, and signal capture.</li>
</ul>
<p><iframe title="ESP32-DIV: Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/jVp1zlcsrOY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>White Hacker Cyber Security Pro <span style="color: #0000ff;"><em><strong>Cifer</strong> </em></span>&#8221; ESP32-Div is a multi-featured wireless analysis device for WiFi, Bluetooth, 2.4 GHz, and sub-GHz signals. While ESP32-Div is not based on SDR technology, it is still an interesting device for wireless hackers to discuss.</p>
<p>ESP32-Div can monitor WiFi packets, spam fake WiFi access points, scan for deauth attacks, and scan nearby WiFi networks. For Bluetooth, it can jam, scan, spoof, and cause unintended behaviours on Apple devices via spoofing the AirDrop function. It can also be used as a general 2.4 GHz scanner and jammer. Finally, it can perform replay attacks and jam signals for sub-GHz signals.</p>
<p>The device consists of a custom PCB with an ESP32 and a built-in battery pack. A piggybacking shield adds 3x NRF24 modules for the 2.4 GHz features and a CC1101 module for the sub-GHz features.</p>
<p>Obviously, functions like jamming and spoofing are highly illegal in most countries, but it is interesting to see the capabilities available to anyone with these cheap chips and the right software. <a href="https://www.rtl-sdr.com/esp32-div-an-esp32-based-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p>I’m Cifer, and after months of anticipation, I’m finally ready to introduce you to the ESP32DIV—an upgraded version of my original project that has been years in the making. If you’re excited about wireless tech, cybersecurity, and open-source hardware, then this is the project for you! Today, I’ll walk you through all the new features and the hardware behind this amazing device.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f525.png" alt="🔥" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The ESP32DIV Evolution</h3>
<p>The ESP32DIV project originally started a few years ago. You all loved the first version, but compared to the new iteration, that one was like a “kindergarten project.” The new version is packed with upgrades and is much more powerful. While the old version only supported Wi-Fi and BLE, the ESP32DIV now has support for 2.4GHz and Sub-GHz frequencies, expanding its capabilities beyond what we originally imagined.</p>
<p>You might be wondering about the name—ESP32DIV. The “ESP32” part is obvious, but “DIV” comes from Persian mythology. In Persian culture, div refers to a supernatural being or demon—powerful and often associated with chaos and evil. It’s a fitting name for a tool that disrupts and manipulates wireless signals!</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21117" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg" alt="" width="828" height="466" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ESP32-DIV-Your-Swiss-Army-Knife-for-Wireless-Networks-768x432.jpg 768w" sizes="(max-width: 828px) 100vw, 828px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f310.png" alt="🌐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Exploring the Features</h3>
<p>Let’s dive into the features that make the ESP32DIV so special. I’ve split the functionalities into several menus, each offering a unique set of tools for wireless manipulation and analysis.</p>
<h3><strong>Wi-Fi Menu:</strong></h3>
<p><strong>• Packet Monitor:</strong><br />
The Packet Monitor displays live traffic across all 14 Wi-Fi channels, visualized as a waterfall graph. This feature gives you real-time insight into what’s happening in your Wi-Fi environment.</p>
<p><strong>• Beacon Spammer:</strong><br />
This tool sends out fake Wi-Fi access points (beacon frames) to flood the airwaves. You can use it to disrupt connections, confuse nearby devices, or even trick users into connecting to fake networks. It offers two options: one that targets specific access points with custom names, and another that generates random fake networks.</p>
<p><strong>• Deauth Detector:</strong><br />
This feature scans for deauthentication attacks and other suspicious activity. Originally focused on detecting deauth attacks, it has evolved into a more general-purpose threat detection tool.</p>
<p><strong>• Wi-Fi Scanner:</strong><br />
The Wi-Fi Scanner provides a full list of nearby Wi-Fi networks along with detailed information about each one. It’s perfect for network analysis or security assessments.</p>
<p>&nbsp;</p>
<h3><strong>Bluetooth Menu:</strong></h3>
<p><strong>• BLE Jammer:</strong><br />
The BLE Jammer floods Bluetooth Low Energy (BLE) advertising channels with noise, making it harder for devices to discover or connect to each other. It also supports classic Bluetooth channels.</p>
<p><strong>• BLE Spoofer:</strong><br />
The BLE Spoofer mimics real BLE devices by sending fake advertising packets. You can impersonate specific devices and launch spoofing operations to test how other devices respond to fake signals.</p>
<p><strong>• Sour Apple:</strong><br />
Designed for Apple devices, the Sour Apple tool exploits BLE features like AirDrop and Continuity. It spoofs Apple BLE advertisements to trigger unintended behaviors or potentially cause data leaks.</p>
<p><strong>• BLE Scanner:</strong><br />
This tool scans for nearby BLE devices, even those normally hidden from your phone or laptop. You’ll receive detailed information on each device, making it great for analysis or security research.</p>
<h3><strong>2.4GHz Menu:</strong></h3>
<p><strong>• 2.4GHz Scanner:</strong><br />
This scans the entire 2.4GHz spectrum across 128 channels, enabling detection of a variety of wireless protocols—not just Wi-Fi and Bluetooth. It’s especially useful for spotting Zigbee networks or proprietary RF protocols operating in the same frequency range.</p>
<p><strong>• Protokill:</strong><br />
Protokill lets you jam different wireless protocols on the 2.4GHz band, including Zigbee and Wi-Fi. It’s perfect for stress testing protocols and conducting specific jamming operations.</p>
<p><strong>Sub-GHz Menu:</strong><br />
<strong>• </strong>Replay Attack:<br />
Capture a signal (such as a door unlock command) and replay it to gain unauthorized access. This tool allows you to store and replay captured signals, visualized with a real-time waterfall graph to help you better understand the process.</p>
<p><strong>• Sub-GHz Jammer:</strong><br />
This feature disrupts wireless communication in Sub-GHz frequencies, targeting devices like garage door openers, remote controls, and IoT sensors. You can select specific frequencies to jam or let the device automatically cycle through them.</p>
<p><strong>• Saved Profiles:</strong><br />
This section stores all captured signals from the Replay Attack feature, allowing you to revisit them, replay frequencies, or delete profiles as needed.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e0.png" alt="🛠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The Hardware Behind ESP32DIV</h3>
<p>Now that you’ve seen the features, let’s take a look at the hardware. The ESP32DIV is made of two main sections: the Main Board and the Shield.</p>
<p><strong>Main Board:</strong></p>
<p><strong>• </strong>LF33: A voltage regulator providing a stable 3.3V supply.<br />
<strong>• </strong>TP4056: Lithium battery charger with protection.<br />
<strong>• </strong>CP2102: USB-to-serial converter for flashing and communication.<br />
<strong>• </strong>PCF8574: I/O expander for managing multiple button inputs.<br />
<strong>• </strong>SD Card Slot: For saving captured signals, logs, and configurations.<br />
<strong>• </strong>ESP32-U (16MB version): The core microcontroller with Wi-Fi and BLE.<br />
<strong>• </strong>Antenna Connector: For connecting external antennas.<br />
<strong>• </strong>ILI9341 TFT Display: A 2.8-inch screen for UI and live data.<br />
<strong>• </strong>Push Buttons: For menu navigation.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21126" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg" alt="" width="805" height="453" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-1024x576.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_7956.00_09_14_18.Still013-1536x864-1-768x432.jpg 768w" sizes="(max-width: 805px) 100vw, 805px" /></p>
<p>&nbsp;</p>
<p><strong>Shield:</strong><br />
<strong>• </strong>3 x NRF24 Modules: For 2.4GHz operations like jamming and attacks.</p>
<p><strong>• </strong>CC1101 Module: Su</p>
<hr />
<h1 class="elementor-heading-title elementor-size-default">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p><iframe title="Your Swiss Army Knife for Wireless Networks" width="640" height="360" src="https://www.youtube.com/embed/bUvBjcczzcc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>In our increasingly connected world, where Wi-Fi networks are the backbone of our digital lives, there’s a growing need for tools that can help us understand, troubleshoot, and secure these networks. Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and detect deauthentication attacks. Sounds intriguing, right? Well, you’re in luck because we’ve built just the gadget for you.</p>
<p><iframe title="&#x1f510; Sub-GHz Replay Attack in action with ESP32-DIV #cybersecurity #esp32 #gadgets" width="640" height="360" src="https://www.youtube.com/embed/jjO6Zj0ANJY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> About the Project</h3>
<p>Our creation is a versatile gadget that combines the power of the ESP32 microcontroller, the visual appeal of an ST7735 TFT LCD screen, and the convenience of microswitches for easy navigation. This multifaceted device is designed to assist network administrators, security enthusiasts, and IoT developers in understanding and managing wireless networks.</p>
<p>Let’s dive deeper into the features, the technology, and the journey of building this remarkable gadget.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21119" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg" alt="" width="820" height="547" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-400x267.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMG_2684-1024x683-1-768x512.jpg 768w" sizes="(max-width: 820px) 100vw, 820px" /></p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Features</h3>
<p>Our ESP32-based gadget boasts four main features, each catering to a specific aspect of wireless network management:</p>
<p><strong>• Packet Monitor</strong><br />
The Packet Monitor function allows you to capture and analyze network traffic in real-time. Whether you’re troubleshooting network issues or simply curious about the data flowing through the airwaves, this feature provides valuable insights.</p>
<p><strong>• Wi-Fi Analyzer</strong><br />
With the Wi-Fi Analyzer, you can scan the vicinity for available Wi-Fi networks. Discover SSIDs, signal strengths, and security protocols, all at the press of a button. It’s an indispensable tool for finding the best Wi-Fi connection.</p>
<p><strong>• Beacon Spam</strong><br />
Beacon Spamming is both intriguing and educational. It involves simulating beacon frames to broadcast information about a non-existent network. While not for malicious purposes, this function sheds light on the inner workings of Wi-Fi networks.</p>
<p><strong>• Deauth Detector</strong><br />
Network security is paramount, and the Deauth Detector function ensures you stay vigilant. It monitors for deauthentication packets, often a sign of an unauthorized intrusion. When detected, the gadget alerts you with both visual and audible cues.</p>
<p>Now that you’re familiar with what our gadget can do let’s get into the nitty-gritty of creating your very own wireless network Swiss Army knife.</p>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9f0.png" alt="🧰" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Getting Started</h3>
<p><strong>• TFT LCD ST7735</strong><br />
The ST7735 TFT LCD is the visual gateway to your gadget’s capabilities. Its vibrant display provides real-time feedback and enables user interaction. With a resolution of X by Y, it ensures that information is presented clearly and intuitively.</p>
<p><strong>• ESP32 Microcontroller</strong><br />
The ESP32 microcontroller is the brains behind the operation. Its built-in Wi-Fi and Bluetooth capabilities make it the ideal choice for this project. It handles the various functions, communicates with the TFT LCD, and manages user input through micro switches.</p>
<p><strong>• Micro Switches</strong><br />
Navigation is made easy thanks to the inclusion of micro switches. These tactile buttons allow users to move through menus, select functions, and interact with the gadget effortlessly.</p>
<h3 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f50c.png" alt="🔌" class="wp-smiley" style="height: 1em; max-height: 1em;" />Schematic</h3>
<p dir="auto" tabindex="-1">Before you begin assembling your gadget, it’s essential to understand the connections between the components. The table below outlines the connections between the ESP32, ST7735 TFT LCD, and micro switches:</p>
<p><strong>• ESP32 / st7735 TFT LCD</strong></p>
<table>
<thead>
<tr>
<th>Pin Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>14</td>
<td>CS</td>
</tr>
<tr>
<td>33</td>
<td>RST</td>
</tr>
<tr>
<td>27</td>
<td>DC</td>
</tr>
<tr>
<td>18</td>
<td>CLK</td>
</tr>
<tr>
<td>23</td>
<td>DIN</td>
</tr>
<tr>
<td>5V</td>
<td>VCC</td>
</tr>
<tr>
<td>3V3</td>
<td>LED</td>
</tr>
<tr>
<td>GND</td>
<td>GND</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><strong>• ESP32 / Micro Switch</strong></p>
<table>
<thead>
<tr>
<th>Name</th>
<th>GPIO Pin</th>
</tr>
</thead>
<tbody>
<tr>
<td>Select</td>
<td>25</td>
</tr>
<tr>
<td>Up</td>
<td>21</td>
</tr>
<tr>
<td>Down</td>
<td>22</td>
</tr>
<tr>
<td>Back</td>
<td>26</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h3 id="user-content-dart-features" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Core Functions</h3>
<p dir="auto" tabindex="-1">Now, let’s delve into the core functions of your gadget:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21120" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg" alt="" width="462" height="558" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274908_y-768x928-1-331x400.jpg 331w" sizes="(max-width: 462px) 100vw, 462px" /></p>
<p>&nbsp;</p>
<p><strong>• Packet Monitoring</strong><br />
the packet monitor allows you to receive the packets and surveillance the specific chosen channel. The Packet Monitoring function leverages the ESP32’s Wi-Fi capabilities to capture and analyze wireless packets. in promiscuous mode, enabling it to monitor all nearby Wi-Fi traffic. The information gathered is then displayed on the TFT LCD screen in real time.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21122" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg" alt="" width="438" height="607" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1.jpg 739w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274909_y-739x1024-1-289x400.jpg 289w" sizes="(max-width: 438px) 100vw, 438px" /></p>
<p><strong>• Wi-Fi Scanning</strong><br />
The Wi-Fi Scanning function detects and lists nearby access points. You’ll utilize the ESP32’s scanning functions to retrieve information about SSIDs, signal strengths, channels and security protocols. This valuable data is presented to the user for network selection.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21123" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg" alt="" width="458" height="565" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5260253284902489871_y-768x947-1-324x400.jpg 324w" sizes="(max-width: 458px) 100vw, 458px" /></p>
<p><strong>• Beacon Spamming</strong><br />
in this section, by choosing the desired channel you can create and spam fake Wi-Fi access points. Beacon Spamming involves crafting and broadcasting fake beacon frames. This function is for educational purposes, allowing users to understand how networks announce their presence.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-21124" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg" alt="" width="479" height="617" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/photo_5233345941858274910_y-768x990-1-310x400.jpg 310w" sizes="(max-width: 479px) 100vw, 479px" /></p>
<p><strong>• Deauth Detection</strong><br />
Implement de-authentication detection by monitoring the network for deauth packets. all channels will be scanned for any de-authentication attack and will display the amount of detected packets for every channel. When detected, trigger the buzzer and LED to alert the user.</p>
<h2 dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f440.png" alt="👀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Use Cases</h2>
<p>Explore practical use cases for your gadget:</p>
<p><strong>Network Troubleshooting</strong>: Use the packet monitoring and Wi-Fi scanning functions to troubleshoot network issues, identify interference, and optimize Wi-Fi performance.</p>
<p><strong>Ethical Hacking Practice</strong>: Beacon spamming and deauth detection can be used for educational purposes in learning about network security and ethical hacking techniques.</p>
<p><strong>Security Audits</strong>: Offer your gadget as a tool for security professionals to perform security audits on wireless networks.</p>
<p><strong>IoT Projects</strong>: Extend the capabilities of your gadget by integrating it into IoT projects where wireless network monitoring is essential.</p>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-5427" src="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png" sizes="(max-width: 30px) 100vw, 30px" srcset="https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-150x150.png 150w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-300x300.png 300w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1022x1024.png 1022w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-768x770.png 768w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-1532x1536.png 1532w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-2043x2048.png 2043w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-500x500.png 500w, https://cifertech.net/wp-content/uploads/2023/01/github-icon-white-github-icon-black-background-symbol-logo-trademark-steering-wheel-transparent-png-842663-750x750.png 750w" alt="" width="30" height="30" /></p>
<h2 dir="auto">Code</h2>
<p>If you’re interested in building this project on your own, the code is available on GitHub. Simply go to the GitHub repository, and download the code.</p>
<p><strong>GitHub repository</strong>: <a href="https://github.com/cifertech/ESP32-DIV">github.com/cifertech/ESP32-DIV</a></p>
<h2><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f64c.png" alt="🙌" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Special Thanks to Our Sponsor: PCBWay</h2>
<p>No project is complete without the right tools and materials. That’s where our sponsor, <strong>PCBWay</strong>, stepped in to provide essential support for this project. PCBWay is a leading provider of high-quality printed circuit boards (PCBs) and PCB assembly services.</p>
<p><strong>Website</strong>: <a href="https://www.pcbway.com/" target="_new" rel="noopener">PCBWay Official Website</a></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21125" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg" alt="" width="1024" height="576" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/MVI_2629.MP4.00_00_01_17.Still001-1024x576-1-768x432.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<h2 id="user-content-star2-about-the-project" dir="auto" tabindex="-1"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Conclusion</h2>
<p>In this blog, we embarked on an exciting journey to create a multifunctional gadget using the ESP32 microcontroller, a TFT LCD, and various other components. We explored the hardware components, designed a custom PCB, programmed the device to perform packet monitoring, Wi-Fi scanning, beacon spamming, and deauth detection, and discussed practical use cases.</p>
<p>The world of wireless network monitoring and security is vast, and our gadget can be a valuable tool for enthusiasts, professionals, and learners alike. By understanding the core functions and use cases, you’re well-equipped to build, use, and expand upon this versatile ESP32-based device.</p>
<p>As technology continues to evolve, having the ability to create custom gadgets that address specific needs becomes increasingly valuable. Whether you’re a tinkerer, a student, or a professional, the skills and knowledge gained from this project open doors to countless possibilities in the world of IoT and network security.</p>
<p>So, what’s next for your ESP32 gadget? Will you explore more functions, enhance the user interface, or find new and innovative ways to apply it in your projects? The choice is yours, and the journey is bound to be exciting and rewarding.<a href="https://cifertech.net/esp32-div-your-swiss-army-knife-for-wireless-networks/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="hckui__typography__h1">ESP32-DIV: Your Swiss Army Knife for Wireless Networks</h1>
<p class="hckui__typography__bodyL hckui__layout__marginBottom15">Imagine having a device that can not only monitor network traffic but also scan for nearby Wi-Fi networks, simulate beacon frames, and</p>
<p><iframe title="ESP32-DIV Deauther &#x1f4e1; #esp32 #gadgets #cybersecurity" width="640" height="360" src="https://www.youtube.com/embed/fTTjPQxpWMk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div class="markdown-heading"></div>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DI83DcJu6XR/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DJj6SwHuBzN/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Cifer (@cifertech)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</title>
		<link>https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 21:00:06 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[how to defend from WiFi Pineapple]]></category>
		<category><![CDATA[how to protect your wifi]]></category>
		<category><![CDATA[How to Protect Yourself From Pineapple Attacks]]></category>
		<category><![CDATA[how to secure your wireless network]]></category>
		<category><![CDATA[how to stop a hacker]]></category>
		<category><![CDATA[Wi-Fi Pineapple]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21143</guid>

					<description><![CDATA[What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data. Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity. Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="article-header-title">What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</h1>
<p><iframe title="How to Defend Against WiFi Attacks and WiFi Pineapples" width="640" height="360" src="https://www.youtube.com/embed/ZXuXIFeYdP4?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<section class="emaki-custom-block emaki-custom-key-points" data-nosnippet="">
<div id="custom_block_0" class="emaki-custom key-points">
<div class="custom_block-content key-points">
<ul>
<li>Wi-Fi Pineapples trick you into connecting to fake networks, in an attempt to compromise your security and data.</li>
<li>Protect yourself by avoiding public Wi-Fi, using VPNs, and watching for suspicious activity.</li>
<li>Businesses should invest in secure Wi-Fi hardware, monitor their networks for unknown devices, and pay attention to what their IT department says.</li>
</ul>
</div>
</div>
</section>
<p>&#8220;Wi-Fi Pineapple&#8221; is a silly name for a real threat to your cybersecurity. These devices trick you into connecting to fake Wi-Fi networks to intercept data and compromise your privacy. Here&#8217;s how to protect against Pineapples and Wi-Fi attacks.</p>
<h2 id="what-is-a-wi-fi-pineapple">What Is a Wi-Fi Pineapple?</h2>
<p>A Wi-Fi Pineapple is a device ostensibly sold for Wi-Fi security auditing, that can also be used to perform real attacks on your devices.</p>
<p class="adsninja-injected-repeatable-ad-afterend">It&#8217;s not literally a pineapple (though I&#8217;m sure some enterprising hacker out there has at least attempted to house a Raspberry Pi in an actual pineapple fruit), but named because early devices resembled pineapples, with antennas sticking out at all angles much like pineapple leaves.</p>
<p>&#8220;Wi-Fi Pineapple&#8221; referred to a specific commercial device that automates man-in-the-middle attacks, but these attacks can also be performed with readily available off-the-shelf hardware, including laptops and single board computers.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2025/05/52675364250_f1a7116783_o.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;Corbin Davenport \/ How-To Geek&lt;br \/&gt;\n&lt;br \/&gt;\n&amp;nbsp;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone wp-image-21146" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif" alt="" width="524" height="294" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-400x224.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1024x575.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-768x431.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/52675364250_f1a7116783_o-1536x862.avif 1536w" sizes="(max-width: 524px) 100vw, 524px" /><figcaption class="body-img-caption"></figcaption>How Do Wi-Fi Attacks Work?</figure>
</div>
</div>
<p>There are two main types of attacks that use Wi-Fi networks: &#8220;evil twin&#8221; attacks impersonate known Wi-Fi networks, and trick your device into connecting to them, intercepting data and potentially giving remote access to your device. &#8220;Rogue AP (access point)&#8221; attacks advertise open networks in the hope that naive or internet-desperate users will connect, with the same outcomes.</p>
<p>Malicious Wi-Fi hotspots are set up in coffee shops, airports, and hotels in an attempt to get you to connect without any technical trickery. Often, simply naming the network something legitimate-sounding (like the name of the hotel) is enough to fool people into thinking it&#8217;s the real deal.</p>
<div class="body-img landscape ">
<div class="responsive-img image-expandable img-article-item" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2022/11/Joe-at-coffee-shop.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&lt;em&gt;Joe Fedewa \/ How-To Geek&lt;\/em&gt;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21145" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif" alt="" width="650" height="365" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop.avif 650w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Joe-at-coffee-shop-400x225.avif 400w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p class="adsninja-injected-repeatable-ad-beforebegin">For individuals, the primary threat of joining a malicious Wi-Fi network is the interception and recording of the data that is transmitted: emails, social network logins, and other sensitive information (including what websites you visit) can be recorded, and even if encrypted, there&#8217;s still the possibility that they can be exploited. Devices with improperly configured firewalls may also be remotely accessed via a compromised network, putting all the data on your device at risk.</p>
<p>For businesses, there is an additional threat: Wi-Fi Pineapples and other malicious devices can be inserted into networks (either using an unguarded Ethernet socket, or by capturing legitimate Wi-Fi credentials and cracking them), granting the attacker unfettered access to internal company infrastructure.</p>
<div class="ad-even"></div>
<h2 id="how-to-protect-yourself-from-pineapples">How To Protect Yourself From Pineapples</h2>
<p>The best way to protect yourself from a pineapple is to stay out of its way. Avoid public Wi-Fi if you can by tethering to your mobile phone to get online. If you do have to use public Wi-Fi, use a reputable VPN and set it up so that all internet traffic must go through it (known as a &#8220;kill switch&#8221; in some VPN interfaces). Travel routers are also great for this, allowing you to tether multiple devices or put multiple devices behind a VPN.</p>
<p class="adsninja-injected-repeatable-ad-beforebegin">While an actual Wi-Fi Pineapple device may be difficult to detect, there are additional measures you can take to protect yourself from fake hotspots and man-in-the-middle attacks in general. Before you connect to a network, check for duplicates or suspicious network names, and avoid scanning QR codes to connect unless they&#8217;re in a position they&#8217;re unlikely to have been tampered with. You can also disable auto-connect for public networks you&#8217;ve joined previously so that you don&#8217;t mistakenly reconnect to an impostor.</p>
<p>At home, make sure you change the default Wi-Fi network and administrator passwords and set up a guest network for visitors to use. A separate IoT network for your &#8220;smart&#8221; devices can also prevent them becoming a vector for network intruders. If you notice similar network names appearing in your neighborhood, consider changing the name of your own network so you don&#8217;t accidentally connect to someone else&#8217;s.</p>
<div id="b56b-4e7d-b914f2043dfd" class="display-card article article-card small no-badge active-content " data-include-community-rating="false" data-nosnippet="">
<div class="w-img ">
<div class="body-img landscape ">
<div class="responsive-img img-featured-4-pin-single-size-featured-secondary" data-img-url="https://static1.howtogeekimages.com/wordpress/wp-content/uploads/2024/06/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21144" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif" alt="" width="844" height="536" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center.avif 844w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-400x254.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a-phone-on-the-bluetooth-pairing-screen-and-the-bluetooth-icon-in-the-center-768x488.avif 768w" sizes="(max-width: 844px) 100vw, 844px" /></figure>
</div>
</div>
</div>
</div>
</figure>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Generally, you should always heed SSL certificate warnings and unexpected redirects that may indicate your connection has been compromised. Never log into a website or app if you see one of these warnings. If you&#8217;re on public Wi-Fi, disconnect, and if you&#8217;re at home, start taking steps to diagnose and fix the issue(or call your local tech support). If a website login screen looks different to what you&#8217;re used to, you should also be suspicious that your traffic may be being re-routed to a fake site intended to steal your details.</p>
<h2 id="how-businesses-can-prevent-pineapple-attacks" class="adsninja-injected-repeatable-ad-beforebegin">How Businesses Can Prevent Pineapple Attacks</h2>
<p>If you run a business that provides Wi-Fi to staff or the public, it&#8217;s your responsibility to keep it secure. Give your IT team the time and resources they need to deploy, secure, and maintain infrastructure properly, or risk it falling out of date and being vulnerable to new attacks.</p>
<p>Your network should be regularly scanned for unauthorized devices and rogue Wi-Fi networks that may have been set up to trap employees or customers. If something suspicious is found, hunt down the rogue device (it might be hiding in a dusty corner under a couch in a café, for example) and remove it. Use enterprise-grade Wi-Fi hardware like Unifi that provides client isolation, management tools, and additional security features to make sure your network is under your control.</p>
<div class="ad-even"></div>
<h2 id="tips-for-staying-safe-in-a-dangerous-digital-world">Tips for Staying Safe in a Dangerous Digital World</h2>
<p>Antivirus and personal firewalls also play a key part in staying safe when connecting to public networks. If your device is compromised, they can help detect and block malicious software and activity so that you can secure your accounts and get your device fixed.</p>
<p>There&#8217;s also a laundry list of security tips and best practices you should follow to help prevent yourself becoming a victim of cybercrime. Following security advice can be inconvenient (especially when you really need to get online and you&#8217;re out of phone reception), but it&#8217;s worth it in the long run. <a href="https://www.howtogeek.com/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!</title>
		<link>https://goodshepherdmedia.net/building-a-23-wi-fi-pineapple-in-6-minutes-%e2%80%95-easiest-method/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 15:12:24 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[DIY WiFi Pineapple]]></category>
		<category><![CDATA[how to defend from WiFi Pineapple]]></category>
		<category><![CDATA[WiFi Pineapple Definition]]></category>
		<category><![CDATA[WiFi Pineapple Uses]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21137</guid>

					<description><![CDATA[Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method! &#160; WIFI Pineapple : DIY WIFI Pineapple Setup Guide Tp-Link Router with WIFI Pineapple Firmware I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the Hak5 Wi-Fi Pineapple to build up my red teaming toolkit, but [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 id="post-title-t3_1hinq26" class="text-neutral-content-strong m-0 font-semibold text-18 xs:text-24 mb-xs px-md xs:px-0 xs:mb-md overflow-hidden" aria-label="Post Title: Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!" aria-describedby="feed-post-credit-bar-t3_1hinq26">Building a $23 Wi-Fi Pineapple in 6 Minutes ― EASIEST method!</h1>
<p><iframe title="Build a $23 Wi-Fi Pineapple in 6 Minutes — EASIEST Method! [Pt. I]" width="640" height="360" src="https://www.youtube.com/embed/udnxagkSzoA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Upgrading the $23 Wi-Fi Pineapple for MAX Hackability! [Pt. II]" width="640" height="360" src="https://www.youtube.com/embed/pHtpso21P0o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Did you know you can make your own Wifi Pineapple for $30?" width="640" height="360" src="https://www.youtube.com/embed/-Zqan1CRIq0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h1 id="6b40" class="pw-post-title gu gv gw bf gx gy gz ha hb hc hd he hf hg hh hi hj hk hl hm hn ho hp hq hr hs ht hu hv hw bk" data-testid="storyTitle" data-selectable-paragraph="">WIFI Pineapple : DIY WIFI Pineapple Setup Guide</h1>
<figure class="mi mj mk ml mm mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg mh"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21153" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA.jpg" alt="" width="1050" height="608" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA.jpg 1050w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-400x232.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-1024x593.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_bsSxIRNRttsr6l3zG6FhHA-768x445.jpg 768w" sizes="(max-width: 1050px) 100vw, 1050px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Tp-Link Router with WIFI Pineapple Firmware</figcaption></figure>
<p id="01c6" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the <a class="ag nv" href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener ugc nofollow">Hak5 Wi-Fi Pineapple</a> to build up my red teaming toolkit, but I needed to stick to a budget. The Hak5 Wifi Pineapple is a powerful and versatile wireless penetration testing. It allows users to create rogue Wi-Fi networks, enabling them to intercept and analyze network traffic for security testing purposes. It could perform Evil Portal, MITM, DNS poisoning and many wireless attacks using web interface.</p>
<p id="fba1" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">After some initial research, I found that the Wifi Pineapple runs on OpenWrt. Also, I found this GitHub project by <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds" target="_blank" rel="noopener ugc nofollow">Xchwarze</a> which talks about cloning the Wifi Pineapple.</p>
<h2 id="10e8" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph="">Here’s the outline of this project:</h2>
<ul class="">
<li id="678f" class="mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu ou ov ow bk" data-selectable-paragraph="">Install <a class="ag nv" href="https://openwrt.org/releases/19.07/start" target="_blank" rel="noopener ugc nofollow">OpenWrt</a> firmware.</li>
<li id="ea37" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu ou ov ow bk" data-selectable-paragraph="">Install the Pineapple firmware <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds/blob/main/releases/archer-c7-v4-universal-sysupgrade.bin" target="_blank" rel="noopener ugc nofollow">upgrade file</a>.</li>
<li id="7709" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu ou ov ow bk" data-selectable-paragraph="">Set up Wifi Pineapple.</li>
</ul>
<h2 id="9b8c" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph="">You’ll need the following essentials for this project:</h2>
<ol class="">
<li id="586c" class="mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu pc ov ow bk" data-selectable-paragraph="">Any compatible router with OpenWRT (I’ll be using Tp-Link Archer C7).</li>
<li id="b291" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">A USB drive for installing modules.</li>
<li id="d374" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">OpenWrt 19.07.7.</li>
<li id="3c44" class="mx my gw mz b na ox nc nd ne oy ng nh ni oz nk nl nm pa no np nq pb ns nt nu pc ov ow bk" data-selectable-paragraph="">Wi-Fi Pineapple firmware.</li>
</ol>
<p id="d367" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">With these in hand, we’re ready to proceed with the setup process! So, let’s jump right into it!</p>
<p id="a4c2" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Install OpenWrt firmware:</strong></p>
<p id="5dba" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Download the OpenWrt firmware 19.07.7 using this <a class="ag nv" href="https://openwrt.org/releases/19.07/start" target="_blank" rel="noopener ugc nofollow">link</a>. Then, navigate to your default router login page and upgrade the firmware by simply uploading the OpenWrt router firmware file.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pd"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21154" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q.webp" alt="" width="1100" height="529" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-400x192.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-1024x492.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_7bq3gk4eoCIOBChzB-bM8Q-768x369.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div>
</figure>
<p id="0ce3" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">It will take a few minutes for the router to reboot.<strong class="mz gx"> Do not restart or power off your router during this process, as it may brick your devic</strong>e. Once it’s flashed with OpenWrt, it’s time to upgrade to the Pineapple firmware.</p>
<p id="a355" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Install the Pineapple firmware upgrade file:</strong></p>
<p id="3757" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">First, we need to download the Pineapple firmware upgrade file. Choose the appropriate router and download the firmware file from the <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds" target="_blank" rel="noopener ugc nofollow">Github repo</a>. For my setup, I will be using the <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner-builds/blob/main/releases/archer-c7-v4-universal-sysupgrade.bin" target="_blank" rel="noopener ugc nofollow">Archer C7 v4 universal file</a>.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pj"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21152" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg.webp" alt="" width="1100" height="336" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-400x122.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-1024x313.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_w_mqzb8KwgYQ5OR4PlxQzg-768x235.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div>
</figure>
<p id="5e06" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Connect your device using an Ethernet port and open 192.168.1.1 in your browser. Navigate to the <em class="pk">System</em> tab and click on the <em class="pk">Flash Image</em> option. Choose the Flash Image and upload the Pineapple firmware sysupgrade file you recently downloaded. Uncheck the “<em class="pk">Keep settings and retain the current configuration</em>” box, then click <em class="pk">continue</em>. Again, this process should take a couple of minutes. Just a reminder: <strong class="mz gx">do not restart or power off your router</strong> during this time to avoid any interruptions in the firmware upgrade.</p>
<p id="4f1d" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph=""><strong class="mz gx">Setup Wifi Pineapple:</strong></p>
<p id="be88" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Once the router restarts, connect it to the internet and browse to 172.16.42.1:1471 to setup your WIFI Pineapple. Congratulations, enjoy your newly configured Wifi Pineapple!”</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pl"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21151" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw.webp" alt="" width="1100" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-400x171.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-1024x437.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_1ONiqNm2KeUfYTZAl7ftpw-768x327.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Wifi Pineapple Dashboard</figcaption></figure>
<p id="4bd9" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Now that the Wifi Pineapple is set up, let’s proceed with installing modules to make it fully functional.</p>
<p id="729e" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Plug the USB drive into the router and format it using the provided tool under <em class="pk">Advanced</em> &gt; <em class="pk">USB &amp; Storage</em> &gt;<em class="pk"> Format SD Card</em>. This step ensures your USB drive is ready to install the necessary modules for your Wifi Pineapple.</p>
<p id="b4e5" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">Simply click the <em class="pk">Get Modules</em> button and then click <em class="pk">Install</em> for the modules you would like to use. Be sure to install dependencies for each module once they are installed.</p>
<figure class="pe pf pg ph pi mn mf mg paragraph-image">
<div class="mo mp fl mq bh mr" tabindex="0" role="button">
<div class="mf mg pm"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21150" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ.webp" alt="" width="1100" height="542" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-400x197.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-1024x505.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/1_ozr7fRgP8tRPF8_kgznmeQ-768x378.webp 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
</div><figcaption class="mt ff mu mf mg mv mw bf b bg ab du" data-selectable-paragraph="">Installing Modules</figcaption></figure>
<h2 id="5874" class="nw nx gw bf ny nz oa dy ob oc od ea oe ni of og oh nm oi oj ok nq ol om on oo bk" data-selectable-paragraph=""><strong class="am">Conclusion</strong></h2>
<p id="bb67" class="pw-post-body-paragraph mx my gw mz b na op nc nd ne oq ng nh ni or nk nl nm os no np nq ot ns nt nu gp bk" data-selectable-paragraph="">This is just a proof of concept to show that we can build a Wifi Pineapple on a budget, achieving similar functionality as the official one. Of course, I’d still suggest buying the <a class="ag nv" href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener ugc nofollow">Hak5 WIFI Pineapple</a> to support the creators. I had a blast experimenting with my homemade version.</p>
<p id="ea61" class="pw-post-body-paragraph mx my gw mz b na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu gp bk" data-selectable-paragraph="">I’m thinking of getting a compatible router like Gl.iNet, which is pocket-sized and can be powered by a power bank. This could come in handy, especially when traveling with a gigantic router is a hassle. Big thanks to <a class="ag nv" href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener ugc nofollow">Xchwarze</a> for sharing this project with the community. <a href="https://medium.com/@aleemS/wifi-pineapple-diy-wifi-pineapple-setup-guide-93fb12a97845" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="jumbotron">
<h1 class="font-weight-light">DIY WiFi Pineapple</h1>
<h3 class="display-3">Introduction</h3>
<p class="lead">This guide will give you everything you need to build your own customizable wifi pineapple on a budget using the <a href="https://www.gl-inet.com/products/gl-ar150/">GL.iNet GL-AR150</a>. The guide includes step by step pictures, alternative analysis, power metrics, and more!</p>
<p>What is WiFi Pineapple?</p>
<ul>
<li>WiFi Pineapple is formally a product produced and sold by the company <a href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener">Hak5</a></li>
<li>The device is used as a pentest tool and can be used as a rogue access point in both passive and active attacks.</li>
<li>Check out the official documentation for more information: <a href="https://wiki.wifipineapple.com/#!index.md" target="_blank" rel="noopener">https://wiki.wifipineapple.com</a></li>
</ul>
<p class="lead">This guide contains the following sections:</p>
<ol>
<li class="tallmargin"><b class="text-success">Comparing Pineapples</b> &#8211; Shows hardware differences of both products</li>
<li class="tallmargin"><b class="text-success">Materials Needed</b> &#8211; List of materials you need to build an AR150 WiFi Pineapple</li>
<li class="tallmargin"><b class="text-success">Flashing Pineapple Firmware</b> &#8211; Step by step guide to install the Pineapple firmware</li>
<li class="tallmargin"><b class="text-success">Hardware Modifications</b> &#8211; A guide to integrate the USB hub into the case of the AR150</li>
</ol>
<p class="lead">For additional resources on my website click the links below:</p>
<p><span style="color: #ff0000;"><strong>Comparing Pineapples</strong></span></p>
</div>
<div id="Comparing" class="jumbotron"><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21155" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized.webp" alt="" width="900" height="400" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized.webp 900w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized-400x178.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/nano_vs_ar150_optimized-768x341.webp 768w" sizes="(max-width: 900px) 100vw, 900px" /></center></p>
<h3>Hardware Differences: <span class="text-success"><b>None</b></span></h3>
<table class="table table-hover">
<thead>
<tr>
<th scope="col"></th>
<th scope="col">Nano</th>
<th scope="col">AR150</th>
</tr>
</thead>
<tbody>
<tr>
<th scope="row">CPU</th>
<td>Atheros9331, 400MHz SoC</td>
<td>Atheros9331, 400MHz SoC</td>
</tr>
<tr>
<th scope="row">Memory</th>
<td>DDR2 64MB</td>
<td>DDR2 64MB</td>
</tr>
<tr>
<th scope="row">Storage</th>
<td>Flash 16MB</td>
<td>Flash 16MB</td>
</tr>
<tr>
<th scope="row">Wireless 1</th>
<td>Atheros AR9331 (IEEE 802.11 b/g/n)</td>
<td>Atheros AR9331 (IEEE 802.11 b/g/n)</td>
</tr>
<tr>
<th scope="row">Wireless 2</th>
<td>Atheros AR9271 (IEEE 802.11 b/g/n)</td>
<td>RT5370 USB WiFi Adapter (IEEE 802.11 b/g/n)</td>
</tr>
<tr>
<th scope="row">Price</th>
<td><span class="text-warning"><b>$100</b></span></td>
<td><span class="text-success"><b>$35</b></span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
</div>
<div id="Materials" class="jumbotron">
<h1 class="display-3">Materials Needed</h1>
<div class="row align-items-center my-5">
<div class="col-lg-4"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21156" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized.webp" alt="" width="300" height="300" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/materials_optimized-150x150.webp 150w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<div class="col-lg-8">
<h1 class="font-weight-light">Basic <i><small class="text-muted">(Total $35)</small></i>:</h1>
<p>&nbsp;</p>
<ul class="list">
<li class="list-item">AR150 &#8211; $26 (<a href="https://www.amazon.com/dp/B01FJ4S9JK" target="_blank" rel="noopener">https://www.amazon.com/dp/B01FJ4S9JK</a>)</li>
<li class="list-item">RT5370 Wifi adapter &#8211; $6 (<a href="https://www.ebay.com/itm/282647848601" target="_blank" rel="noopener">https://www.ebay.com/itm/282647848601</a>)</li>
<li class="list-item">Flash Drive (1gb and up)</li>
<li class="list-item">USB 2.0 Hub (NOT 3.0)</li>
<li class="list-item">Power adapter or external battery (CURRENT)</li>
</ul>
<p>&nbsp;</p>
<h3 class="font-weight-light">Advanced Materials:</h3>
<p>&nbsp;</p>
<ul class="list">
<li class="list-item">USB Hub &#8211; $4 (<a href="https://www.ebay.com/itm/173995917456" target="_blank" rel="noopener">https://www.ebay.com/itm/173995917456</a>)</li>
<li class="list-item">Soldering Iron with fine &#8220;I&#8221; tip (<a href="https://www.amazon.com/dp/B07GTGGLXN" target="_blank" rel="noopener">https://www.amazon.com/dp/B07GTGGLXN</a>)</li>
<li class="list-item">Helping Hand (<a href="https://www.amazon.com/dp/B000P42O3C" target="_blank" rel="noopener">https://www.amazon.com/dp/B000P42O3C</a>)</li>
<li class="list-item">3D Printed Case Extension
<ul>
<li>Print: <a href="https://github.com/LinuxOperator/AR150-Case-Extension" target="_blank" rel="noopener">https://github.com/LinuxOperator/AR150-Case-Extension</a></li>
<li>Buy:</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
</div>
</div>
<p>&nbsp;</p>
</div>
<div id="Flashing" class="jumbotron">
<h1 class="display-3">Flash Pineapple Firmware</h1>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21157" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150-and-box-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 1:</h4>
<p>Download the WiFi Pineapple firmware that was modified for the AR150: <span class="text-success">gl-ar150-nano-&lt;version&gt;-optimized.bin</span></p>
<h4>Step 2:</h4>
<p>Power on AR150 and connect a computer to the device&#8217;s LAN by one of the following:</p>
<ul>
<li>Connect an Ethernet cable to your computer from the &#8220;LAN&#8221; port</li>
<li>Connect to its WiFi network &#8220;GL-AR150-xxx&#8221; using the password &#8220;goodlife&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21158" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11.webp" alt="" width="2558" height="1178" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11.webp 2558w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-1024x472.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-768x354.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-1536x707.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_11-2048x943.webp 2048w" sizes="(max-width: 2558px) 100vw, 2558px" /></center></p>
<h4>Step 3:</h4>
<p>Navigate to <a href="http://192.168.1.1/" target="_blank" rel="noopener">http://192.168.1.1</a> in a web browser and perform initial setup:</p>
<ul>
<li>Set Password (Note: this password will only be used once)</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21159" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_09-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 4:</h4>
<ul>
<li>From the admin panel click on &#8220;More Settings&#8221; then click &#8220;Advanced&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21161" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_08-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 5:</h4>
<ul>
<li>Login with username &#8220;root&#8221; and your password created in step #2</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21160" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07.webp" alt="" width="2560" height="1170" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-1024x468.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-768x351.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-1536x702.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_07-2048x936.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 6:</h4>
<ul>
<li>Click on &#8220;System&#8221; then on &#8220;Backup / Flash Firmware&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21162" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05.webp" alt="" width="2560" height="1178" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-1024x471.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-768x353.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-1536x707.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_05-2048x942.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 7:</h4>
<ul>
<li>Flash the optimized .bin file:
<ul>
<li>Under &#8220;Flash new firmware image&#8221; uncheck &#8220;Keep settings&#8221;</li>
<li>Choose File and select the .bin you downloaded in step 1</li>
<li>Click &#8220;Flash image&#8221;</li>
</ul>
</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21163" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04.webp" alt="" width="2560" height="1172" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-1024x469.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-1536x703.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_04-2048x938.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 8:</h4>
<ul>
<li>Click &#8220;Proceed&#8221;</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21164" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03.webp" alt="" width="2560" height="1180" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-400x184.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-1024x472.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-768x354.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-1536x708.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_03-2048x944.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 9:</h4>
<ul>
<li>Wait about 5min for the flash to complete.</li>
<li>Join the new network:
<ul>
<li>The device will now have a different Wifi SSID and IP address range.</li>
<li>Follow the guide bellow to connect to the pineapple over Wifi or LAN&#8230;</li>
</ul>
</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21165" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02.webp" alt="" width="2560" height="1172" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-1024x469.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-1536x703.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_02-2048x938.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 10:</h4>
<h4 class="text-warning">If on <u>WiFi</u></h4>
<ul>
<li>Search for a network with &#8220;pineapple&#8221; in the name, connect to it</li>
<li>Change your computer&#8217;s IP address to &#8220;172.16.42.42&#8221;</li>
<li>Navigate to <a href="https://172.16.42.1:1471/" target="_blank" rel="noopener">https://172.16.42.1:1471</a> in your web browser</li>
<li>When you see the prompt for &#8220;Secure Setup&#8221;, <u>proceed by holding the reset button for ~5 seconds</u></li>
</ul>
<h4 class="text-warning">If on <u>Ethernet LAN</u></h4>
<ul>
<li>Change your computer&#8217;s IP address to &#8220;172.16.42.42&#8221;</li>
<li>Navigate to <a href="https://172.16.42.1:1471/" target="_blank" rel="noopener">https://172.16.42.1:1471</a> in your web browser</li>
<li>When you see the prompt for &#8220;Secure Setup&#8221;, proceed by quickly pressing the reset button (don&#8217;t hold it)</li>
</ul>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21166" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01.webp" alt="" width="2560" height="1174" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-400x183.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-1024x470.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-768x352.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-1536x704.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_steps_01-2048x939.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 11:</h4>
<ul>
<li>Pineapple Configuration:
<ul>
<li>Root Password</li>
<li>Time Zone</li>
<li>other</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
</div>
<div id="Modifications" class="jumbotron">
<h1 class="display-3">Hardware Modifications</h1>
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21167" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21168" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150.gif" alt="" width="448" height="252" /></p>
<h4>Step 1:</h4>
<ul>
<li>Remove the back cover</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21169" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_apart_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 2:</h4>
<ul>
<li>Dissasemble the USB Hub (A screwdriver and some prying should do the trick, don&#8217;t damage the female usb ports)</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21170" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/cover_off_more_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 3:</h4>
<ul>
<li>Note the order of the wires, the wires should go in this order onto the AR150 board</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21171" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_soldered_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 4:</h4>
<ul>
<li>Solder the wires with a fine soldering tip (&#8220;I&#8221; is recommended)</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21172" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/case_extension_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 5:</h4>
<ul>
<li>3D print the case extender using the following settings (or Buy: )</li>
<li>Plastic: PLA or PETG (ABS may shrink and cause model to not fit)</li>
<li>Layer Height:</li>
<li>Density: %</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21173" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hub_glued_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 6:</h4>
<ul>
<li>Insert the USB hub and hot glue it in place for added support</li>
</ul>
<hr />
<p><center><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21174" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-scaled.webp" alt="" width="2560" height="1707" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-400x267.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-1024x683.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-768x512.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-1536x1024.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/ar150_built_optimized-2048x1365.webp 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /></center></p>
<h4>Step 7:</h4>
<ul>
<li>Snap the pieces together making sure it is correctly aligned <a href="https://linuxoperator.com/guides/ar150/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<h2><span style="color: #ff0000;">HOW TO USE YOUR WIFI PINEAPPLE</span></h2>
<p><iframe title="How Hackers Use DNS Spoofing to Phish Passwords (WiFi Pineapple Demo)" width="640" height="360" src="https://www.youtube.com/embed/33H0ILk-yd8?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="ad-odd">
<p><iframe title="Create Rogue Networks on the WiFi Pineapple (PineAP KARMA Attacks)" width="640" height="360" src="https://www.youtube.com/embed/fOmDNn2aXXA?list=PLW5y1tjAOzI2iSdHIGrOeb1-bNWB7TKMI" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<h3></h3>
<p>if you need a full sevice PCB manufacturer go here <a href="https://www.pcbway.com/" target="_blank" rel="noopener">PCBWay</a></p>
<p><span class="author flex-self-stretch"><a href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener">GitHub</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/ </span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/xchwarze/wifi-pineapple-cloner" target="_blank" rel="noopener" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">wifi-pineapple-cloner</a></strong></p>
<p>by <span class="author flex-self-stretch"><a class="url fn" href="https://github.com/xchwarze" target="_blank" rel="author noopener" data-hovercard-type="user" data-hovercard-url="/users/xchwarze/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">xchwarze</a></span></p>
<h2><strong><span style="color: #ff0000;">learn how to defend yourself below </span></strong></h2>
<blockquote class="wp-embedded-content" data-secret="ZK9TP04eMW"><p><a href="https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/">What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;What is a Wi-Fi Pineapple? How to Protect Yourself From Pineapple Attacks&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/what-is-a-wi-fi-pineapple-how-to-protect-yourself-from-pineapple-attacks/embed/#?secret=bbgtP1PQCg#?secret=ZK9TP04eMW" data-secret="ZK9TP04eMW" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<hr />
<h1 class="cmp-hero__title">WiFi Pineapple Definition &amp; Pineapple Router Uses</h1>
<div class="cmp-hero__text rte-content">
<p>Learn how Adaptive Multi-Factor Authentication combats data breaches, weak passwords, and phishing attacks.</p>
</div>
<p>A WiFi Pineapple is a small piece of equipment with a silly name and a lot of power. Some people use this tool for a legitimate security purpose. Others use it for hacking.</p>
<p>Whether you work in security or are concerned about the safety of your own data, it pays to know what a Pineapple router is. Chances are, you&#8217;ll encounter it at least once during your lifetime.</p>
<h2 data-anchor="anchor-subtitle-0">What Is a WiFi Pineapple?</h2>
<p>The size and shape of this device give the WiFi Pineapple its name. It&#8217;s a small, black device with several spikes. Developers thought it looked a bit like tropical fruit, so they named it accordingly.</p>
<p>The WiFi Pineapple was developed by Hak5, a private company. For <a href="https://shop.hak5.org/products/wifi-pineapple" target="_blank" rel="noopener noreferrer"><u>about $100</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, you can purchase one for yourself or your company. And you&#8217;re not required to disclose what you&#8217;d like to use it for.</p>
<p>Hak5 is known for creating testing tools. When the WiFi Pineapple was <a href="https://www.vice.com/en/article/pa39xv/pineapple-wifi-how-to-mitm-hack" target="_blank" rel="noopener noreferrer"><u>released in 2008</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, most people assumed testers would find it useful and everyone else would ignore it. The reality is a bit different.</p>
<h2 data-anchor="anchor-subtitle-1">How a WiFi Pineapple Works</h2>
<p>&lt; Open a WiFi channel on your computer, and the device will make a connection to an available router. A WiFi Pineapple is positioned between the device and the router, and with the proper programming, it can inspect all the data as it moves from one location to another.</p>
<p>Setting up a WiFi Pineapple isn&#8217;t always easy. Bloggers who detail their work create posts that take up <a href="https://www.troyhunt.com/the-beginners-guide-to-breaking-website/" target="_blank" rel="noopener noreferrer"><u>dozens of screens</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>. But when the work is done, you&#8217;ll be able to look over all the traffic moving to and from a device and a WiFi router.</p>
<p>The device makes use of the underlying technology in any WiFi system. When you connect to a WiFi, your device remembers the service set identifier (SSI) of that router. When you&#8217;re in the same location, your device seeks out a router with the right SSI.</p>
<p>A WiFi Pineapple imitates the proper SSI, and that means anyone preprogrammed to connect will link with the Pineapple router instead.</p>
<h2 data-anchor="anchor-subtitle-2">Legitimate Uses of a Pineapple Router</h2>
<p>Computer security experts must understand how their systems work, where they are breaking, and why they might be vulnerable to an attack. A Pineapple WiFi router makes that work much easier.</p>
<p>During a penetration test (or pentest), experts attempt to hack a system, and they document their work for fixes and corrections. Typically, a pentest requires <a href="https://www.makeuseof.com/tag/wifi-pineapple-protect/" target="_blank" rel="noopener noreferrer"><u>specialized software and operating systems</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>. But a WiFi Pineapple makes it really easy.</p>
<p>A security analyst might set up a Pineapple WiFi and then:</p>
<ul>
<li><b>Look for hookups. </b>Do people from your company attach to it automatically rather than using your authorized WiFi?</li>
<li><b>Watch for disclosures. </b>During a man-in-the-middle attack, a hacker watches all the data that passes between a device and a server. A WiFi Pineapple mimics this approach. How much would an attacker see?</li>
<li><b>Seek out access. </b>Can a hacker who sets up a man-in-the-middle attack gain further access to your system?</li>
<li><b>Watch for alarms. </b>Do your automated systems catch the intruder? How long does it take?</li>
</ul>
<p><a href="https://www.wifipineapple.com/pages/software" target="_blank" rel="noopener noreferrer"><u>WiFi Pineapple software</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> makes monitoring easy. You&#8217;ll get email alerts throughout the simulated attack, and you can even tag interesting devices and follow them after they&#8217;ve been tapped by the program.</p>
<p>Someone using a WiFi Pineapple emerges with a significant amount of data about how the system works and what should be fixed.</p>
<h2 data-anchor="anchor-subtitle-3">Hackers Use Pineapple WiFi Too</h2>
<p>Just as security experts can launch man-in-the-middle attacks, so can hackers. The technology works in the same way.</p>
<p>A hacker might take over the SSI of a well-known WiFi router, such as one located inside of a college campus. An attack might look like this:</p>
<ul>
<li><b>Select victims. </b>Anyone who has attached to the server before is a target.</li>
<li><b>Set up the attack. </b>Using the WiFi Pineapple, the hacker spoofs the SSI of the intended server.</li>
<li><b>Connect. </b>A student comes within range of the spoofed router and connects.</li>
<li><b>Attack. </b>The hacker can now see everything that moves from the device to the server and back.</li>
</ul>
<p>A quick search brings up plenty of <a href="https://blog.sean-wright.com/man-in-the-middle-with-wifi-pineapple/" target="_blank" rel="noopener noreferrer"><u>step-by-step instructions</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> hackers can follow to craft code. All they need are willing victims.</p>
<p>Unfortunately, many people are willing to connect with WiFi resources that seem free and readily available. They may push past security warnings and decline commonsense steps so they can hop online and complete their tasks.</p>
<p>A hacker even launched an attack like this <a href="https://www.csoonline.com/article/2462478/hacker-hunts-and-pwns-wifi-pineapples-with-0-day-at-def-con.html" target="_blank" rel="noopener noreferrer"><u>at a conference for hackers</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, proving that it&#8217;s almost irresistible for some people.</p>
<p>But some devices now come with sophisticated warning systems, and some don&#8217;t allow connections with devices that don&#8217;t seem secure or legitimate. Some hackers believe the <a href="https://www.reddit.com/r/AskNetsec/comments/70h5ec/is_wifi_pineapple_still_worth_the_price/" target="_blank" rel="noopener noreferrer"><u>WiFi Pineapple heyday is over</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a>, as taking control is more difficult now than it once was.</p>
<p>But if a hacker can execute an attack like this, they can gain access to critical information, such as these:</p>
<ul>
<li>Social Security numbers</li>
<li>Photographs</li>
<li>Bank account numbers</li>
<li>Passwords</li>
</ul>
<h2 data-anchor="anchor-subtitle-4">Protecting Against Wireless Pineapple Attacks</h2>
<p>Hackers are clever, and they use all sorts of tips and tricks to gain access into assets they have no business touching.</p>
<p>Commonsense protection steps involve:</p>
<ul>
<li><b>Avoiding public WiFi. </b>Don&#8217;t connect to any device you don&#8217;t own. Rely on your cell service instead.</li>
<li><b>Turning off WiFi when you leave your house. </b>Don&#8217;t allow your device to scan for SSIDs as you move from location to location. Snap off the functionality when you&#8217;re on the go.</li>
<li><b>Leaning on a VPN. </b><a href="https://www.androidheadlines.com/2019/08/what-is-a-wifi-pineapple-and-can-it-compromise-your-security.html" target="_blank" rel="noopener noreferrer"><u>Virtual private networks</u><span class="cmp-link__screen-reader-only">opens in a new tab</span></a> (or VPNs) encrypt your data as it moves through the internet. Even if you&#8217;re connected via a WiFi Pineapple, your data will be protected.</li>
</ul>
<p>We can help too. Contact us to learn how Okta can help keep your data and users safe from network attacks and vulnerabilities.  <a href="https://www.okta.com/identity-101/wifi-pineapple/" target="_blank" rel="noopener">source</a></p>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3>in case the youtube videos are deleted here they are</h3>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4?_=1" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4</a></video></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-2" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4?_=2" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4</a></video></div>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-3" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4?_=3" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4</a></video></div>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-21137-4" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4?_=4" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4</a></video></div>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Build-a-23-Wi-Fi-Pineapple-in-6-Minutes-—-EASIEST-Method-pt-1.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Upgrading-the-23-Wi-Fi-Pineapple-for-MAX-Hackability-part-2.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/How-Hackers-Use-DNS-Spoofing-to-Phish-Passwords-WiFi-Pineapple-Demo.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Did-you-know-you-can-make-your-own-Wifi-Pineapple-for-30_.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket</title>
		<link>https://goodshepherdmedia.net/esp32-marauder-puts-a-bluetooth-and-wi-fi-pen-testing-toolkit-in-your-pocket/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 17:45:57 +0000</pubDate>
				<category><![CDATA[Adult Fun]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[bluetooth hacking]]></category>
		<category><![CDATA[ESP32]]></category>
		<category><![CDATA[ESP32 Marauder]]></category>
		<category><![CDATA[ESP32 Marauder Kit Assembly and Programming Guide]]></category>
		<category><![CDATA[hack wifi]]></category>
		<category><![CDATA[Marauder]]></category>
		<category><![CDATA[pen test bluetooth]]></category>
		<category><![CDATA[pen test wifi]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[Securing Bluetooth]]></category>
		<category><![CDATA[Securing Wifi]]></category>
		<category><![CDATA[Wi-Fi Pen Testing Toolkit]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20940</guid>

					<description><![CDATA[ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket Justcallmekoko&#8217;s compact open source design takes aim at wireless penetration testing and signal analysis. UPDATE: justcallmekoko has launched a new iteration of the Marauder (v6) for $60, which includes a sleeker look, options for external antennas, and the ability to update its firmware over Wi-Fi [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="shopify-section-sections--17660780183732__header" class="shopify-section shopify-section-group-header-group section-header scrolled-past-header shopify-section-header-hidden shopify-section-header-sticky">
<header class="header header--middle-left header--mobile-center page-width header--has-menu header--has-social header--has-account header--has-localizations">
<div class="header__icons header__icons--localization header-localization">
<div class="desktop-localization-wrapper">
<form id="HeaderCountryForm" class="localization-form" accept-charset="UTF-8" action="https://biscuitshop.us/localization" enctype="multipart/form-data" method="post">
<div>
<h1 class="hckui__typography__h1Responsive hckui__typography__breakWord">ESP32 Marauder Puts a Bluetooth and Wi-Fi Pen Testing Toolkit In Your Pocket</h1>
<h2 class="hckui__typography__h3 hckui__typography__fontWeightNormal hckui__typography__pebble hckui__layout__marginTop15">Justcallmekoko&#8217;s compact open source design takes aim at wireless penetration testing and signal analysis.</h2>
<p><iframe title="ESP32 Marauder" width="640" height="360" src="https://www.youtube.com/embed/gaTFkM--mrg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2 class="hckui__typography__h3 hckui__typography__fontWeightNormal hckui__typography__pebble hckui__layout__marginTop15"><img loading="lazy" decoding="async" class="alignnone wp-image-20945" style="font-size: 16px;" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4.avif" alt="" width="740" height="416" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4.avif 1245w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0421_m104cBpjD4-768x432.avif 768w" sizes="(max-width: 740px) 100vw, 740px" /></h2>
</div>
</form>
</div>
</div>
</header>
<div>
<div id="article_page_simple_ad_portal"></div>
<div class="hckui__layout__flex hckui__layout__marginTop30">
<div class="hckui__layout__flex hckui__layout__flex1">
<div id="articleStickySidebar" class="hckui__util__posRelative hckui__layout__marginRight30 hckui__layout__hiddenMedDown sticky_actions__zIndex10__X1gBe">
<div></div>
<div class="sticky_actions__stickyButton__vVglk"></div>
<div></div>
</div>
</div>
<div class="article_layout__body__fN0GB">
<section>
<div class="article_layout__content__LHCyf project-story hljs-monokai">
<p class="hckui__typography__bodyL"><strong>UPDATE:</strong> justcallmekoko has <a class="hckui__typography__linkBlue" href="https://www.tindie.com/products/justcallmekoko/esp32-marauder-v6/" rel="nofollow">launched a new iteration</a> of the Marauder (v6) for $60, which includes a sleeker look, options for external antennas, and the ability to update its firmware over Wi-Fi and/or SD card.</p>
<div>
<div class="image_carousel__container__hGUHe undefined">
<div class="image_carousel__wrapper__qcLYl lazy_image__fade__47am3 lazy_image__fadeIn__KwFYU" data-intersect-callback-id="cbe451ce-6e87-43e1-8b13-cfb4cb70608d">
<div class="hckui__layout__noScrollBar image_carousel__scrollContainer__c2Pc1 ">
<div class="image_carousel__imageContainer__D2V9v">
<div class="image_carousel__imageWrapper__BpzDn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20946" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI.avif" alt="" width="740" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI.avif 740w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/2020-06-03t21-36-22-1_343z-img_0426_VoVLQOYNWI-400x266.avif 400w" sizes="(max-width: 740px) 100vw, 740px" /></div>
</div>
</div>
</div>
</div>
<div></div>
</div>
<p class="hckui__typography__bodyL"><em>The original article continues below.</em></p>
<p class="hckui__typography__bodyL">Penetration testers and security analysts looking for an easily-pocketable tool for Bluetooth and Wi-Fi testing purposes have another option, in the form of the ESP32 Marauder from security tester justcallmekoko.</p>
<p class="hckui__typography__bodyL">&#8220;The Marauder is a portable penetration testing tool created for Wi-Fi and Bluetooth analysis,&#8221; the pseudonymous justcallmekoko explains. &#8220;It comes installed with a suite of offensive and defensive tools all running on an ESP32. I was inspired to create this tool by Spacehuhn&#8217;s deauther project. I wanted to bring similar functionality to the ESP32 and introduce new Bluetooth capabilities to the tool.&#8221;</p>
<p><iframe title="ESP32 Marauder: Wifi and Bluetooth Hacking Tool" width="640" height="360" src="https://www.youtube.com/embed/BGFO1wA29o8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="hckui__typography__bodyL">&#8220;The tool itself serves as a portable device used to test and analyze Wi-Fi and Bluetooth devices. Use this tool and its firmware with caution as the use of some of its capabilities without explicit consent from the target owner is unlawful in most countries.&#8221;</p>
<p class="hckui__typography__bodyL">The firmware justcallmekoko has created is compatible with any ESP32-based development board, and designed to provide feedback via a 2.8&#8243; ILI9341-based TFT touchscreen display. The pre-assembled versions take the firmware and install it onto a custom PCB with Espressif ESP32-WROOM chip at its heart and an integrated lithium-polymer charging circuit for power on the go.</p>
<div>
<div class="image_carousel__container__hGUHe undefined">
<div class="image_carousel__wrapper__qcLYl lazy_image__fade__47am3 lazy_image__fadeIn__KwFYU" data-intersect-callback-id="dca6131d-8c47-4d38-8aec-1195520d5469">
<div class="hckui__layout__noScrollBar image_carousel__scrollContainer__c2Pc1 ">
<div class="image_carousel__imageContainer__D2V9v">
<div class="image_carousel__imageWrapper__BpzDn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20947" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg.avif" alt="" width="740" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg.avif 740w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/image_0uXwDRPGxg-400x266.avif 400w" sizes="(max-width: 740px) 100vw, 740px" /></div>
</div>
</div>
</div>
<div class="image_carousel__caption__nRb8S">The custom PCB is powered by an ESP32-WROOM. (<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f7.png" alt="📷" class="wp-smiley" style="height: 1em; max-height: 1em;" />: justcallmekoko)</div>
</div>
<div></div>
</div>
<p class="hckui__typography__bodyL">The entire unit is then enclosed in a 3D-printed chassis, which in the case of the pre-assembled version comes in a selection of colors: black, &#8220;Galaxy Black,&#8221; neon green, and silver. Justcallmekoko warns, however, that &#8220;most of the work so far has been put into designing the hardware,&#8221; meaning that the current release has &#8220;limited firmware capabilities&#8221; — but that development is ongoing to add new features and functionality.</p>
<p class="hckui__typography__bodyL">More details on the project can be found on <a class="hckui__typography__linkBlue" href="https://github.com/justcallmekoko/ESP32Marauder/" target="_blank" rel="nofollow noopener">GitHub</a>, where the firmware, hardware, and 3D print files can be downloaded; the pre-assembled ESP32 Marauder, meanwhile, can be <a class="hckui__typography__linkBlue" href="https://www.tindie.com/products/justcallmekoko/esp32-marauder/" target="_blank" rel="nofollow noopener">purchased from Tindie</a>. <a href="https://www.hackster.io/news/esp32-marauder-puts-a-bluetooth-and-wi-fi-pen-testing-toolkit-in-your-pocket-32d389f6e66f" target="_blank" rel="noopener">source</a></p>
</div>
</section>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<section id="shopify-section-template--17660780740788__main" class="shopify-section section">
<div class="page-width page-width--narrow section-template--17660780740788__main-padding">
<div class="rte scroll-trigger animate--slide-in">
<div class="container">
<hr />
<h1 class="terminal-typed">ESP32 Marauder Kit Assembly and Programming Guide</h1>
<p>Thank you for purchasing the ESP32 Marauder Kit! Let&#8217;s get started with assembling and programming your device.</p>
<p><iframe title="New ESP32 MARAUDER v7!  A Penetration Tester&#039;s DREAM!!" width="640" height="360" src="https://www.youtube.com/embed/qbmrIkyX__k?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2 class="terminal-typed">Things You&#8217;ll Need</h2>
<ul>
<li>A computer with <a title="Google Chrome" href="https://www.google.com/chrome/" target="_blank" rel="noopener">Google Chrome</a></li>
<li>A 3 mm Allen Wrench</li>
<li>An ESP32 Marauder Kit</li>
</ul>
<h2 class="terminal-typed">Programming the Device</h2>
<ol>
<li style="list-style-type: none;">
<ol>
<li>First lets program the device as the buttons are not accessible while assembled. Go to :<br />
<strong><a title="Marauder Online Flasher" href="https://flasher.biscuitshop.us/" target="_blank" rel="noopener">Marauder Online Flasher</a></strong> (https://flasher.biscuitshop.us)</li>
<li>Hold the BOOT button (bottom one) on the back of the Marauder while plugging it into your computer. The screen should stay black if done correctly.</li>
<li>Click the connect button on the website and select the COM port associated with your device. If you have multiple COM ports, unplug the device, see which port disappears, then repeat step two and connect to the correct port.</li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="" src="https://cdn.shopify.com/s/files/1/0635/4059/2820/files/Flash1.png?v=1721276127" alt="Connect the Device" width="1111" height="581" /></p>
</div>
<div class="container">
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20944" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1.webp" alt="" width="1111" height="581" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1.webp 2527w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-400x209.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-1024x536.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-768x402.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-1536x804.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash1-2048x1071.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Click the dropdown menu and select <strong>CYD2USB w/o GPS. Do not choose the one shown in the pic (Unless you purchased from me early on and your device does not have USB-C), I have started using the new models for all orders going forward.</strong></li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20943" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-scaled.webp" alt="" width="1111" height="492" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-scaled.webp 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-400x177.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-1024x453.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-768x340.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-1536x680.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash2-2048x907.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Click the latest version 2.8 inch &#8211; (1.0.0) and click the program button. Allow it to finish without switching windows.</li>
</ol>
</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-20942" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3.webp" alt="" width="1111" height="491" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3.webp 2556w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-400x177.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-1024x452.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-768x339.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-1536x678.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Flash3-2048x904.webp 2048w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<ol>
<li>Once programming is complete, the display will stay black. Power cycle the device, and it should boot into the Marauder firmware.</li>
</ol>
<p>This same process can be used to update your device as new releases come out. As of July 15, 2024, Version 1.0.0 has just been released.</p>
<h2 class="terminal-typed">Assembling the Device</h2>
<div class="toggle-container"><strong><span class="toggle-label">Switch to Battery-Powered Instructions</span></strong></div>
<div id="standardAssembly">
<ol>
<li>Take the bottom part of the case and place the ESP32 Marauder PCB into it.</li>
<li>Install the top cover and use the 4 provided screws to fasten it to the bottom half.</li>
</ol>
</div>
</div>
</div>
</div>
</section>
<p><a href="https://biscuitshop.us/pages/esp32-marauder-instructions?srsltid=AfmBOopNsca-dtlVK6EXx_Cs2nWLXZgaA51ItiAJ8iOzLKFFOrfT0wf_" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Work IT? Know What a BLEShark Nano is? Lets Explore&#8230;.</title>
		<link>https://goodshepherdmedia.net/work-it-know-what-a-bleshark-nano-is-lets-explore/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 13 May 2025 15:11:26 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[BLEShark Nano]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20303</guid>

					<description><![CDATA[Work IT? Know What a BLEShark Nano is? Lets Explore&#8230;. BLEShark Nano: A Compact Wireless Multi-Tool for Hackers InfiShark&#8217;s BLEShark Nano Is a Pocket-Friendly Espressif ESP32-Powered Bluetooth and Wi-Fi Tool Built around a Seeed Studio XIAO ESP32C3, this tiny tool delivers powerful potential — but in a proprietary firmware. A portable device for testing Bluetooth. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Work IT? Know What a BLEShark Nano is? Lets Explore&#8230;.</h1>
<h2 class="normal">BLEShark Nano: A Compact Wireless Multi-Tool for Hackers</h2>
<p><iframe title="&quot;Exploring the BLESHARK NANO: Brand New Cyber Security Gadget! &#x1f988;" width="640" height="360" src="https://www.youtube.com/embed/1SuJgvuI1zc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div style="width: 360px;" class="wp-video"><video class="wp-video-shortcode" id="video-20303-5" width="360" height="640" autoplay preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/The-Truth-The-concept-of-law-rules-and-morality-require-equality.mp4?_=5" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/05/The-Truth-The-concept-of-law-rules-and-morality-require-equality.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/05/The-Truth-The-concept-of-law-rules-and-morality-require-equality.mp4</a></video></div>
<h1 class="hckui__typography__h1Responsive hckui__typography__breakWord">InfiShark&#8217;s BLEShark Nano Is a Pocket-Friendly Espressif ESP32-Powered Bluetooth and Wi-Fi Tool</h1>
<h2 class="hckui__typography__h3 hckui__typography__fontWeightNormal hckui__typography__pebble hckui__layout__marginTop15">Built around a Seeed Studio XIAO ESP32C3, this tiny tool delivers powerful potential — but in a proprietary firmware.</h2>
<blockquote>
<p style="text-align: center;"><span style="color: #0000ff;">A portable device for testing Bluetooth. Wi-Fi, and Infrared vulnerabilities—including games, apps, auto updates, and a buttery-smooth interface.</span></p>
</blockquote>
<p><iframe title="BEWARE of a new secret hacking tool!" width="640" height="360" src="https://www.youtube.com/embed/xYlB4SqSVxU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="article_layout__body__fN0GB">
<section>
<div class="article_layout__content__LHCyf project-story hljs-monokai">
<p class="hckui__typography__bodyL">The multi-functional Bluetooth Low Energy (BLE) and Wi-Fi security-testing and debugging tool is priced at at $35, at claimed 10 percent discount over the eventual retail price — with discounts rising if you need more than one unit, maxing out at 20 per cent for &#8220;early bird&#8221; backers of a five-pack.</p>
<p class="hckui__typography__bodyL">The campaign is now live <a class="hckui__typography__linkBlue" href="https://www.kickstarter.com/projects/infishark/bleshark-nano-a-compact-wireless-multi-tool-for-hackers/" rel="nofollow">on Kickstarter</a>, with all hardware expected to ship in March or April 2025.</p>
<p class="hckui__typography__bodyL"><em>Original article continues below.</em></p>
<p class="hckui__typography__bodyL">Ontario-based InfiShark Tech is preparing to launch a crowdfunding campaign for the BLEShark Nano, an Espressif ESP32-powered tool designed for testing Bluetooth and Wi-Fi systems for vulnerabilities.</p>
<p class="hckui__typography__bodyL">&#8220;The BLEShark Nano is a pocket-sized [Espressif] ESP32 based device that brings a massive amount of pentesting features, apps, and games into a very compact device,&#8221; the company writes of its creation. &#8220;In a sense, it is the Swiss Army knife of wireless tools. The BLEShark Nano packs a surprising array of features designed for network testing and experimentation, making it an accessible and effective tool for those interested in cybersecurity!&#8221;</p>
<div>
<div class="image_carousel__container__hGUHe undefined">
<div class="image_carousel__wrapper__qcLYl lazy_image__fade__47am3 lazy_image__fadeIn__KwFYU" data-intersect-callback-id="60a2cc98-3163-42e7-9482-cbe479492152">
<div class="hckui__layout__noScrollBar image_carousel__scrollContainer__c2Pc1 ">
<div class="image_carousel__imageContainer__D2V9v">
<div class="image_carousel__imageWrapper__BpzDn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20305" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/BLEShark-Nano.avif" alt="" width="740" height="416" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/BLEShark-Nano.avif 740w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/BLEShark-Nano-400x225.avif 400w" sizes="(max-width: 740px) 100vw, 740px" /></div>
</div>
</div>
</div>
<div class="image_carousel__caption__nRb8S">InfiShark&#8217;s BLEShark Nano is an upcoming Seeed XIAO ESP32C3-based pentesting tool for Bluetooth and Wi-Fi. (<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4f7.png" alt="📷" class="wp-smiley" style="height: 1em; max-height: 1em;" />: InfiShark Tech)</div>
</div>
<div>
<blockquote>
<h1 class="custom-heading" style="text-align: center;"><em><span style="color: #ff0000;">The Swiss Army Knife of <span class="typing-container"><span id="typing-effect">Hacking</span></span> Tools.</span></em></h1>
</blockquote>
</div>
</div>
<p class="hckui__typography__bodyL">The compact gadget, housed in a 3D-printed case, features a 0.66&#8243; OLED display below which three tactile buttons act as the user interface. Inside the housing is a Seeed Studio XIAO ESP32C3 microcontroller board and a 500mAh battery — good, the company claims, for an average of 10 hours of active use between charges.</p>
<p class="hckui__typography__bodyL">In use, the firmware delivers a range of tools designed for penetration testing of wireless networks: BLE Beacon spamming, Wi-Fi access point spamming, captive portal creation, and Bad-BT keystroke injection — plus a selection of reimplementations of classic arcade games like Space Invaders and Pong, for downtime. The gadget can also be used as a Bluetooth remote, with plans to launch additional features including infrared support.</p>
<p class="hckui__typography__bodyL">InfiShark is planning to launch a crowdfunding campaign for the gadget at the end of this month, with interested parties invited to sign up <a class="hckui__typography__linkBlue" href="https://www.kickstarter.com/projects/infishark/bleshark-nano-a-compact-wireless-multi-tool-for-hackers" rel="nofollow">on Kickstarter</a> to be notified when it goes live. Additional details are available <a class="hckui__typography__linkBlue" href="https://hackaday.io/project/199277-bleshark-nano-esp32-based-multi-tool-for-hackers" rel="nofollow">on Hackaday.io</a> and <a class="hckui__typography__linkBlue" href="https://infishark.com/" rel="nofollow">the company website</a>, though while the company maintains <a class="hckui__typography__linkBlue" href="https://github.com/grdashark/BLEShark" rel="nofollow">a GitHub repository</a> with STL files for the case it says the firmware is &#8220;proprietary and closed-source.&#8221; <a href="https://www.hackster.io/news/infishark-s-bleshark-nano-is-a-pocket-friendly-espressif-esp32-powered-bluetooth-and-wi-fi-tool-ba6e4d5b8d79">source</a></p>
<hr />
</div>
</section>
</div>
<h1>BLEShark Nano: Your Ultimate Wireless Testing Companion</h1>
<p><iframe title="FIRST LOOKS! BLEShark Nano: In-Depth Look at UI, Advanced Settings, and Pro Tips!" width="640" height="360" src="https://www.youtube.com/embed/RZK1mf4Nfa8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><img loading="lazy" decoding="async" class="wp-image-20308 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/BLEShark-Nano-1.avif" alt="" width="479" height="620" /></p>
<p>The BLEShark Nano combines cutting-edge technology with an intuitive interface, offering full control over wireless network interactions. Whether you&#8217;re securing your network or developing custom apps and games, this tool provides the flexibility and power you need.</p>
<p>Now, let&#8217;s get into the features and functions in more detail!</p>
<div class="template asset" contenteditable="false" data-alt-text="Hardware Features" data-caption="" data-id="46946810">
<figure class="image">
<h3 id="h:Hardware-Features" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/810/95d751e206bdf2c83867eed22e8a5a6e_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365121&amp;width=680&amp;sig=vhZtmiOXJ%2FOdEMGlocH6WICrbs1Sn3ym7958dscSEIc%3D" alt="Hardware Features" /></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="47961473">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/047/961/473/1ba6e44524d11f3a87ea64553b49f043_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1737895508&amp;width=680&amp;sig=S7TLtM%2BR4TTfbnEqnLZaalkmwCauGu7vcPOctadngx8%3D" alt="" /></figure>
</div>
<h3><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/26a1.png" alt="⚡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>What is it?</strong></h3>
<blockquote>
<h4><span style="color: #339966;"><strong><em>The BLEShark Nano is an all-in-one sleek &amp; compact multi-tool for hackers, tech enthusiasts, and cybersecurity beginners. With features like Wi-Fi, BLE, and IR pentesting tools, getting into cybersecurity has never been easier to access with the BLEShark Nano.</em></strong></span></h4>
</blockquote>
<p>The <strong>BLEShark Nano</strong> is a powerful, <strong>ESP-32-based tool</strong> for attacks like <strong>Bluetooth Low Energy (BLE)</strong> spamming, <strong>Wi-Fi</strong> spamming, <strong>deauthentication attacks</strong>, a wide range of network testing functions, and even various wireless apps. With its sleek OLED interface, exploring and testing vulnerabilities in BLE and Wi-Fi networks has never been more intuitive or accessible. A 500mah battery keeps it on for <strong>4+ hours</strong> while spamming. The durable case is <strong>3D printed</strong> with <strong>PLA-CF</strong>, closed up <strong>tightly</strong> with M3x12 screws and brass inserts.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f916.png" alt="🤖" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Why did we make it?</strong></p>
<p>We built the BLEShark Nano to <strong>empower security researchers</strong> and hobbyists with a compact, <strong>cheap</strong>, unique and <strong>versatile </strong>tool for assessing vulnerabilities in BLE and Wi-Fi bands. It’s an <strong>all-in-one</strong> platform designed to <strong>educate</strong> and <strong>inspire</strong>, offering a <strong>hands-on approach</strong> to wireless security without the need for multiple, specialized tools.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f31f.png" alt="🌟" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>What makes it special?</strong></p>
<p>What sets the BLEShark Nano apart is its ability to <strong>automatically download and run custom firmware</strong> that unlocks a suite of:</p>
<ul>
<li>BLE spoofing (and spamming),</li>
<li>Wi-Fi beacon spamming,</li>
<li>Captive portals,</li>
<li>Wi-Fi deauth attacks,</li>
<li>Games,</li>
<li>BadBT,</li>
<li>Apps (like a TikTok scroller),</li>
<li>Automatic Updates,</li>
<li>And much more.</li>
<li><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f389.png" alt="🎉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Upcoming Features include:</strong></li>
<li>Handshake Capturing,</li>
<li>BadUSB,</li>
<li>Evil Portal Cred Detector,</li>
<li>And MUCH more.</li>
</ul>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f527.png" alt="🔧" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Whether you&#8217;re conducting <strong>professional </strong>network assessments or diving into wireless security as a <strong>hobby</strong>, the <strong>BLEShark Nano</strong> offers an unparalleled combination of <strong>power, ease-of-use, and flexibility</strong>.</p>
<p><iframe title="BLEShark Nano: Pocket Sized WiFi Security Testing!" width="640" height="360" src="https://www.youtube.com/embed/Mp3k2Nmxv9U?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="47961471">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/047/961/471/e7156351c3e1e0357d2c1343a4898b8f_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1737895497&amp;width=680&amp;sig=vQDQFd1cRqy2TWzy1WMmLIq5UHAjRvvBKwzamR5RY%2Fk%3D" alt="" /></figure>
</div>
<ul>
<li><span class="bold">Small enough to fit in the palm of your hand, </span>it&#8217;s designed for portability and ease of use, no matter where you are. The BLEShark Nano offers all the power of high-end wireless testing gear in a sleek, easy-to-carry form.</li>
<li><span class="bold">No extra hardware or accessories needed:</span> The BLEShark Nano is a fully self-sufficient device, unlike many other tools that require additional setups or builds to work effectively.</li>
<li><span class="bold">500mAh Rechargeable Battery: </span>A massive internal battery provides up to 16 hours of continuous operation with BLE, and up to 6 hours of continuous operation with Wi-Fi on a full charge. On average, you can expect 10 hours of use per charge.</li>
</ul>
<div class="template asset" contenteditable="false" data-alt-text="BLE Beacon Testing" data-caption="" data-id="46939499">
<figure class="image">
<h3 id="h:BLE-Beacon-Testing" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/939/499/7fa90175aed8b56d103459b603dc8fc1_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729290846&amp;width=680&amp;sig=LyUWu66xA2lBagm3AoJbu8Sm3X3RJ%2FVbJ77kDwcSAUs%3D" alt="BLE Beacon Testing" /></figure>
</div>
<p>Using Bluetooth Low Energy, you can <span class="bold">broadcast connection requests</span> to many devices &#8211; great for testing your device&#8217;s Bluetooth capabilities. Select specific targets like Android, Windows, iOS, or Samsung devices. In addition, you can use this feature across <span class="bold">all platforms simultaneously</span>.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="The BLEShark Nano creating popups on iOS, Samsung (or android), and Windows devices." data-id="46947429">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/947/429/590a488e565927554527bea8a2aa9431_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729369210&amp;width=680&amp;sig=69l0VzuS6QkaohXIdlHZ5D7SpT6hzshRR4zwS7%2F8Y%2BY%3D" alt="" data-src="https://i.kickstarter.com/assets/046/947/429/590a488e565927554527bea8a2aa9431_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729369210&amp;width=680&amp;sig=69l0VzuS6QkaohXIdlHZ5D7SpT6hzshRR4zwS7%2F8Y%2BY%3D" /><figcaption class="px2">The BLEShark Nano creating popups on iOS, Samsung (or android), and Windows devices.</figcaption></figure>
</div>
<p>This feature works by broadcasting BLE <span class="bold">advertisement packets</span>, which trigger popups or notifications on various devices like Android, iOS, Windows, and Samsung. This is achieved by sending out <span class="bold">specially crafted packets</span> that mimic legitimate Bluetooth service requests or notifications, thus<span class="bold"> creating popups on the targeted devices</span> with pairing prompts or similar connection requests.</p>
<div class="template asset" contenteditable="false" data-alt-text="Wi-Fi AP Spam" data-caption="" data-id="46946872">
<figure class="image">
<h3 id="h:Wi-Fi-AP-Spam" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/872/6bf2cbe72c314ed525145351f7546f45_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365706&amp;width=680&amp;sig=W4vB6UuDLoS3VrWttdQhsKWXMAt45dQ7P7JBY7Xyab8%3D" alt="Wi-Fi AP Spam" /></figure>
</div>
<p>With the BLEShark Nano, you can create and broadcast <span class="bold">hundreds</span> of custom Wi-Fi network names (SSIDs) for <span class="bold">legitimate testing and educational activities</span>. Whether you&#8217;re testing network resilience, conducting penetration testing, or performing network traffic management simulations, the BLEShark Nano empowers you to generate Wi-Fi networks in a controlled environment. Create networks with randomly generated SSIDs, rickrolls, funny names, duplicate SSIDs, and custom creations.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="46947495">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/947/495/6dd04fad1e76488701f10a4e03475a6b_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729369725&amp;width=680&amp;sig=mwjcNlay4djl3yCaxJjQnNJyc5ewzSjuW%2BMvBk5Xeow%3D" alt="" data-src="https://i.kickstarter.com/assets/046/947/495/6dd04fad1e76488701f10a4e03475a6b_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729369725&amp;width=680&amp;sig=mwjcNlay4djl3yCaxJjQnNJyc5ewzSjuW%2BMvBk5Xeow%3D" /></figure>
</div>
<p>This feature is particularly useful for security professionals and network administrators who want to see how their infrastructure handles a large number of SSID broadcasts, test how devices react to duplicate or misleading network names, or to simulate a public environment.</p>
<div class="template asset" contenteditable="false" data-alt-text="Bad-BT" data-caption="" data-id="46946882">
<figure class="image">
<h3 id="h:Bad-BT" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/882/15f0e1a78b89b50f2121b336d457b948_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365740&amp;width=680&amp;sig=%2FNzqMA9C9q8r6axiDP8LoXRZ0RC6oUE58C6RR7ZQsVo%3D" alt="Bad-BT" /></figure>
</div>
<p>Any Bluetooth-enabled device completely trusts any Bluetooth-connected input devices like keyboards and mice. The BLEShark Nano can<span class="bold"> emulate a Bluetooth HID device</span>, allowing it to be recognized by the target system as a normal Bluetooth keyboard. You can write your own payloads to send any key sequence over Bluetooth, enabling control over the target device, just like the USB <a href="https://shop.hak5.org/products/usb-rubber-ducky" target="_blank" rel="noopener">Rubber Ducky</a>—but <span class="bold">wirelessly</span>. This can be used for testing Bluetooth input vulnerabilities or automating actions on target devices.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="A demonstration of the BLEShark Nano typing 'Hello World!' in Notepad using BadBT." data-id="46948460">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/948/460/932b93b98bca536f344df56902f89f86_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729380193&amp;width=680&amp;sig=PSYo5M%2F1hKNvCu2UKhkkCZTgnakdL3k1HrO%2FGOYdnAk%3D" alt="" data-src="https://i.kickstarter.com/assets/046/948/460/932b93b98bca536f344df56902f89f86_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729380193&amp;width=680&amp;sig=PSYo5M%2F1hKNvCu2UKhkkCZTgnakdL3k1HrO%2FGOYdnAk%3D" /><figcaption class="px2">A demonstration of the BLEShark Nano typing &#8216;Hello World!&#8217; in Notepad using BadBT.</figcaption></figure>
</div>
<p>This feature allows you to write and upload custom scripts that are then executed over a Bluetooth connection. This enables the BLEShark Nano to send <span class="bold">precise and pre-programmed</span> keystroke sequences to <span class="bold">any </span>paired device. You can deploy attacks like opening terminal windows, launching programs, or even typing commands—all without needing physical access to the target.</p>
<p>This is a great tool for vulnerability testing, penetration tests, or simply <span class="bold">automating common actions</span> on paired devices.</p>
<div class="template asset" contenteditable="false" data-alt-text="Captive Portals" data-caption="" data-id="46957678">
<figure class="image">
<h3 id="h:Captive-Portals" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/957/678/7ae701e2d50e7ceaa6e41ee30896e707_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729468054&amp;width=680&amp;sig=5W1a5oQcC8LmRUZGXFZO30iCsNysWnlw5IYT82pk0HU%3D" alt="Captive Portals" /></figure>
</div>
<p>The BLEShark Nano takes network control and testing to the next level with its powerful captive portal feature. <span class="bold">A captive portal</span> is a webpage that users<span class="bold"> must interact with</span> before gaining access to a network. You&#8217;ve probably encountered these on <span class="bold">public </span>Wi-Fi networks that require you to log in, <span class="bold">accept terms of service</span>, or enter a password. The BLEShark Nano allows you to create your own customized captive portal that you can deploy instantly across any Wi-Fi network you set up.</p>
<p>This feature works by creating a Wi-Fi access point (AP) that any device can connect to, but instead of granting full internet access, it redirects users to a web page that <span class="bold">you control.</span> Whether you want to conduct security assessments or just show off your creative custom pages, the captive portal offers endless possibilities for network testing. Once users connect to your network, they are automatically directed to your captive portal without needing to type anything into the browser.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="The BLEShark Nano creates a captive portal under the name &quot;Free WiFi&quot;, then saves the email entered by the user." data-id="46970867">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/970/867/7b48a88f05af4335c46ebf5e7ef7bfbf_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729543212&amp;width=680&amp;sig=crvYUGdGePMj88i6pY7%2FrBuuQ3vQglPwVn8yUygqkJ0%3D" alt="" data-src="https://i.kickstarter.com/assets/046/970/867/7b48a88f05af4335c46ebf5e7ef7bfbf_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729543212&amp;width=680&amp;sig=crvYUGdGePMj88i6pY7%2FrBuuQ3vQglPwVn8yUygqkJ0%3D" /><figcaption class="px2">The BLEShark Nano creates a captive portal under the name &#8220;Free WiFi&#8221;, then saves the email entered by the user.</figcaption></figure>
</div>
<p>You might be thinking, what are <span class="bold">some use cases of this</span> (without actual internet)?</p>
<ul>
<li><span class="bold">Interactive Games</span>:<br />
Embed small games or quizzes to keep users engaged, even when they’re not accessing the web.</li>
<li><span class="bold">Informational Pages</span>:<br />
Set up informational splash pages to share important content with users who connect to your Wi-Fi network.</li>
<li><span class="bold">Wi-Fi Terms and Conditions</span>:<br />
Create a terms and conditions page that must be accepted before connecting to the internet. This is a common feature of public Wi-Fi networks, which can demonstrate how users often accept such agreements without reading the fine print.</li>
</ul>
<p>Unlike many existing tools, the BLEShark Nano offers a fully standalone captive portal feature. There’s no need for additional hardware, complex setups, or relying on external networks. Simply power it on, set up your portal, and start testing or demonstrating its capabilities in seconds.</p>
<div class="template asset" contenteditable="false" data-alt-text="Games" data-caption="" data-id="46946885">
<figure class="image">
<h3 id="h:Games" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/885/49ca565d50121995b1aac7ee2d4ea972_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365748&amp;width=680&amp;sig=Ti%2BRw5TI0Ff2jlWjqnnSco9JJl6HNrVMIV9BqSHiSkk%3D" alt="Games" /></figure>
</div>
<p>The BLEShark Nano also doubles as a<span class="bold"> mini entertainment hub</span>! Whether you’re waiting for a process to finish or just looking for a bit of fun, these built-in games will keep you <span class="bold">entertained </span>wherever you are.</p>
<p>Play timeless arcade hits, including:</p>
<ul>
<li><span class="bold">Flappy Bird</span>: Test your reflexes and skill by guiding the bird through endless obstacles. Simple to play, hard to master!</li>
<li><span class="bold">Invaders</span>: Take command of your spaceship and defend Earth from waves of aliens in this legendary shoot &#8217;em up.</li>
<li><span class="bold">Pong</span>: Experience the game that started it all—bounce the ball back and forth in this iconic two-player challenge, available for solo play against AI or multiplayer fun.</li>
<li><span class="bold">Breakout</span>: Smash your way through walls of bricks with a bouncing ball in this addictive classic.</li>
<li><span class="bold">T-rex game:</span> It&#8217;s the classic &#8220;no internet&#8221; game! Jump over the cacti in the desert!</li>
</ul>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="Play a classic collection of games: Flappy Bird, Invaders, Pong, and Breakout (more games coming in future updates!)" data-id="46948522">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/948/522/42b9d026c78863d6d0ab09068dada62d_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729380778&amp;width=680&amp;sig=%2FuFFJPZCpDxjURNDsRII%2FKuT4AvhJ%2BsamotAZ1Z4jhc%3D" alt="" data-src="https://i.kickstarter.com/assets/046/948/522/42b9d026c78863d6d0ab09068dada62d_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729380778&amp;width=680&amp;sig=%2FuFFJPZCpDxjURNDsRII%2FKuT4AvhJ%2BsamotAZ1Z4jhc%3D" /><figcaption class="px2">Play a classic collection of games: Flappy Bird, Invaders, Pong, and Breakout (more games coming in future updates!)</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="Built-In Apps" data-caption="" data-id="46946887">
<figure class="image">
<h3 id="h:Built-in-Apps" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/887/e3ba04a7062de5769092d9e292159711_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365756&amp;width=680&amp;sig=39YNef6mwLqhnd2Rzbb3Cp0PLaEXF8Cr7MRtLSec330%3D" alt="Built-In Apps" /></figure>
</div>
<p>The BLEShark Nano is <span class="bold">packed with many convenient apps </span>to simplify tasks and keep you entertained. These built-in tools are designed for both practical use and a bit of fun. Let&#8217;s get into them!</p>
<p><span class="bold">TxtViewer</span>:<br />
Easily view and navigate through custom text files, perfect for notes, presentations, or documentation. With smooth scrolling, seamless word wrapping, and an intuitive built-in scroll bar, you can browse long documents effortlessly &#8211; even on the tiny display. (Yep, you can use this for exams <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" />)</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="TxtViewer Demo" data-id="46957033">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/957/033/76fd8d362ead07cd2d18c0ece4d9a97c_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729462536&amp;width=680&amp;sig=M0GPu7nVgiUTCQX02YH724WjGtK6Mxo1zcvMM3JrFSE%3D" alt="" data-src="https://i.kickstarter.com/assets/046/957/033/76fd8d362ead07cd2d18c0ece4d9a97c_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729462536&amp;width=680&amp;sig=M0GPu7nVgiUTCQX02YH724WjGtK6Mxo1zcvMM3JrFSE%3D" /><figcaption class="px2">TxtViewer Demo</figcaption></figure>
</div>
<p><span class="bold">Video Scroller:</span><br />
Connect effortlessly to your phone and unlock a suite of functions with the press of a button. Control every aspect of your watching experience &#8211; just pair with the BLEShark Nano first!</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="A demonstration of the Video Scroller app. Scroll, pause, or like any video." data-id="46980279">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/980/279/dab34c4f11a5452c85b97751bf3dd53e_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729593833&amp;width=680&amp;sig=7DaYB2Y43sClcLhcwAQ49WXpQNs6WLrLOfMVVtwY18g%3D" alt="" data-src="https://i.kickstarter.com/assets/046/980/279/dab34c4f11a5452c85b97751bf3dd53e_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729593833&amp;width=680&amp;sig=7DaYB2Y43sClcLhcwAQ49WXpQNs6WLrLOfMVVtwY18g%3D" /><figcaption class="px2">A demonstration of the Video Scroller app. Scroll, pause, or like any video.</figcaption></figure>
</div>
<p><span class="bold">Mini Programmable Keypad:</span><br />
Take control with a customizable keypad that fits in the palm of your hand. Using BLE, assign up to 8 shortcuts, to streamline your workflow or gaming. Whether for productivity or fun, it offers quick access to your favorite commands.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="A demonstration of the default keypad commands ([R] x1, [L] x1, [S] x1)" data-id="47327903">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/047/327/903/f58d9c3cc6fe4c95c19c7a9945f100b1_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1732016566&amp;width=680&amp;sig=PBhvgdsKWS4v6SXIBA2zF3nNy%2FMKwA%2BeGaiooaAOpAc%3D" alt="" data-src="https://i.kickstarter.com/assets/047/327/903/f58d9c3cc6fe4c95c19c7a9945f100b1_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1732016566&amp;width=680&amp;sig=PBhvgdsKWS4v6SXIBA2zF3nNy%2FMKwA%2BeGaiooaAOpAc%3D" /><figcaption class="px2">A demonstration of the default keypad commands ([R] x1, [L] x1, [S] x1)</figcaption></figure>
</div>
<p>For more information about this app, visit <a href="https://github.com/grdashark/BLEShark/wiki/%E2%8C%A8%EF%B8%8F-Mini-Keypad" target="_blank" rel="noopener">here</a>.</p>
<p><span class="bold">Timers:</span><br />
Set timers with ease, with options ranging from 1 second to 99 minutes. Perfect for quick tasks, workouts, studying, or reminders. Just a few taps and you’re ready to go, all managed from the BLEShark Nano.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="A 5-second timer demo" data-id="47328010">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/047/328/010/25b31c30ea9d9b055f98663296d692a2_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1732017165&amp;width=680&amp;sig=y31NZgRVlE60O%2Fe9NIS01EIj%2BkF9Qy0pPWCdT1z%2BaU0%3D" alt="" data-src="https://i.kickstarter.com/assets/047/328/010/25b31c30ea9d9b055f98663296d692a2_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1732017165&amp;width=680&amp;sig=y31NZgRVlE60O%2Fe9NIS01EIj%2BkF9Qy0pPWCdT1z%2BaU0%3D" /><figcaption class="px2">A 5-second timer demo</figcaption></figure>
</div>
<p><span class="bold">Stopwatch:</span><br />
Transform your device into a sleek, easy-to-use stopwatch. With just a tap, you can start, stop, and reset the stopwatch with absolute precision.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="A very simple stopwatch app." data-id="46982513">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/982/513/431cc7e4965537c2d33eb8df59259834_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729604900&amp;width=680&amp;sig=XkpiU%2BHUNnA2aHwOSpbmmbSZq4zWbGRE2MWn%2FsdnBgU%3D" alt="" data-src="https://i.kickstarter.com/assets/046/982/513/431cc7e4965537c2d33eb8df59259834_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729604900&amp;width=680&amp;sig=XkpiU%2BHUNnA2aHwOSpbmmbSZq4zWbGRE2MWn%2FsdnBgU%3D" /><figcaption class="px2">A very simple stopwatch app.</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="Auto Firmware Updates" data-caption="" data-id="46946888">
<figure class="image">
<h3 id="h:Auto-Firmware-Updates" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/888/04e6fa45e237cb094f099d8097f64254_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365781&amp;width=680&amp;sig=QVkqUnaFoRAwrJLqoL1Bl2zkA8a4IyS4YABqji9EHDk%3D" alt="Auto Firmware Updates" /></figure>
</div>
<p>Stay effortlessly updated with automatic updates, ensuring you never miss out on exciting new features. Each update introduces a variety of enhancements, and we’re dedicated to continuously expanding our offerings. <span class="bold">Your BLEShark Nano will only improve over time,</span> making it an even more powerful tool!</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="The BLEShark Nano updating firmware (sped up)" data-id="46957692">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/957/692/351a55d0620176633edc0fbcfa85198e_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729468198&amp;width=680&amp;sig=RYTp%2FSAeCsV1zf3huuU41M%2Bz85nkCBb2E4fNBnc%2BLi4%3D" alt="" data-src="https://i.kickstarter.com/assets/046/957/692/351a55d0620176633edc0fbcfa85198e_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729468198&amp;width=680&amp;sig=RYTp%2FSAeCsV1zf3huuU41M%2Bz85nkCBb2E4fNBnc%2BLi4%3D" /><figcaption class="px2">The BLEShark Nano updating firmware (sped up)</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="Customization" data-caption="" data-id="46946891">
<figure class="image">
<h3 id="h:Customization" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/891/098de4e2fdf4e2ed33cd542dda029be5_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365795&amp;width=680&amp;sig=ZfcyOmx96BonS0I92P6My2WSbYcEkEeoXlKUz0y4hzQ%3D" alt="Customization" /></figure>
</div>
<p>The BLEShark Nano offers an extensive range of customization options through the <span class="bold">Extra Settings Mode</span>, giving you full control over the device’s behavior and features. It creates its own captive portal, allowing you to connect and manage all settings directly from your browser on any connected device. The sleek and intuitive user interface ensures simple customization, with transitions and an optional <span class="bold">extra dark mode</span> for easy navigation.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="Customize Wi-Fi networks, Security Settings, Spamming Settings, Captive Portal Settings, Update Settings, and Apps Settings." data-id="46983052">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/983/052/fa71a24b0012b76bbd133d2f73fbe480_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729606892&amp;width=680&amp;sig=DocIFa3xS2KJDJstrE%2FJ9eoyKnvSSqamFtL4GmAOtRY%3D" alt="" data-src="https://i.kickstarter.com/assets/046/983/052/fa71a24b0012b76bbd133d2f73fbe480_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729606892&amp;width=680&amp;sig=DocIFa3xS2KJDJstrE%2FJ9eoyKnvSSqamFtL4GmAOtRY%3D" /><figcaption class="px2">Customize Wi-Fi networks, Security Settings, Spamming Settings, Captive Portal Settings, Update Settings, and Apps Settings.</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="Other Features" data-caption="" data-id="46946893">
<figure class="image">
<h3 id="h:Other-Features" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/946/893/240c890e78ba37791171004f26e73478_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729365806&amp;width=680&amp;sig=HIqTqna4ZP3O3NK5NmZz2Mz3XRUdQ0qzWcN7M%2FPbyEw%3D" alt="Other Features" /></figure>
</div>
<p><span class="bold">Emergency Mode: </span><br />
Sometimes, you may have to get away from an app quickly, and that’s where the Emergency Mode of the BLEShark Nano comes into play. By holding the left and right<span class="bold"> buttons together for half a second</span>, you can instantly launch <span class="bold">Flappy Bird</span>, no matter where you are in the device. It might sound a bit unconventional, but when the situation calls for it, a quick switch to a harmless game could be just what you need.</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="Holding down the left and right button together for half a second opens flappy bird." data-id="46983074">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/983/074/cc87acd75e93f18465c264e23e2eeb9a_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729606973&amp;width=680&amp;sig=MNujDTk87JuBVy2DUUeeGUYByiE1ANByzfCRHwt3A74%3D" alt="" data-src="https://i.kickstarter.com/assets/046/983/074/cc87acd75e93f18465c264e23e2eeb9a_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729606973&amp;width=680&amp;sig=MNujDTk87JuBVy2DUUeeGUYByiE1ANByzfCRHwt3A74%3D" /><figcaption class="px2">Holding down the left and right button together for half a second opens flappy bird.</figcaption></figure>
</div>
<p><span class="bold">SPIFFS</span> <span class="bold">System</span>:<br />
The SPIFFS (Serial Peripheral Interface Flash File System) integration in the BLEShark Nano ensures that every little configuration and setting you make on the device is securely stored, so you never lose your work. This powerful embedded file system is used to save your custom settings, Wi-Fi SSIDs, BLE spam configurations, captive portal credentials, captive portal HTML code, TxtViewer files, Ducky Scripts, and much more, directly onto the device’s onboard memory.</p>
<p>With SPIFFS, even if the BLEShark Nano is powered off, reset, or updated, all your configurations remain safe, providing seamless continuity for your work. No need to constantly re-enter or reconfigure your preferred settings—your personalized setup is always ready to go!</p>
<div class="template asset" contenteditable="false" data-alt-text="In Progress" data-caption="" data-id="46983319">
<figure class="image">
<h3 id="h:In-Progress" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/983/319/1aebefc0eaf0523fb428675fa8c234d1_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729607970&amp;width=680&amp;sig=TKc2PDPmT5QvENOWtmuBjmHxak05mxENuWuSWwtKj6w%3D" alt="In Progress" /></figure>
</div>
<p><span class="bold">More Games:</span><br />
We will add some more classics like a high-speed racing/drifting game, a platformer, and more!</p>
<p><span class="bold">BadUSB:</span><br />
Instead of using Bluetooth, you can transform the device into a USB device, allowing you to execute powerful scripts quickly and efficiently.</p>
<p><span class="bold">PC Monitor: </span><br />
Using BLE, you can connect your BLEShark Nano to your PC to monitor real-time performance metrics, including CPU, GPU, and memory usage, all at a glance!</p>
<p><span class="bold">Custom Apps: </span><br />
Build and run your own custom apps directly on the device, tailored to your imagination. Want to share your creation? Submit it to us, and your app could become part of the official firmware for the entire BLEShark Nano community to enjoy!</p>
<p><span class="bold">If you&#8217;re excited to discover even more features we&#8217;re planning to add, check out our </span><a href="https://github.com/grdashark/BLEShark" target="_blank" rel="noopener"><span class="bold">GitHub</span></a><span class="bold"> for the latest updates and future developments!</span></p>
<div class="template asset" contenteditable="false" data-alt-text="Why It's Different" data-caption="" data-id="46689482">
<figure class="image">
<h3 id="h:Why-It-s-Different" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/689/482/f12b130ed001467810b2bc308e9080a8_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1727734310&amp;width=680&amp;sig=6KzL21UrSezP3E3jXA%2B8ZaFt9wI2UrvBAtkxBLMNcGQ%3D" alt="Why It's Different" /></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="47120993">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/047/120/993/faa6ae439205d2452ef13c645bb4cba0_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1730463635&amp;width=680&amp;sig=d6BAfY%2F0bYkvdnnIl27qZZTJWMvfNAqY3uhWwK4aSuY%3D" alt="" /></figure>
</div>
<ul>
<li><span class="bold">It&#8217;s Extremely Affordable</span>: Similar tools can cost hundreds of dollars or require custom builds<span class="bold"> &#8211; </span>the BLEShark Nano is priced with accessibility in mind.</li>
<li><span class="bold">It Has an Easy Setup</span>: No coding or technical expertise required to get started. Charge it up (if not shipped pre-charged), complete the easy setup (for OTA updates), and you&#8217;re ready to go!</li>
<li><span class="bold">It&#8217;s Built for the Future</span>: As technology evolves, so will your BLEShark Nano. We are committed to continually releasing firmware updates with new features and improvements!</li>
<li><span class="bold">Unique Features:</span> Unlike other tools, the BLEShark Nano includes built-in apps and games, adding functionality and entertainment that competitors lack.</li>
</ul>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="47314326">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/047/314/326/ee87d76820bf78747a3d5905a1bfde32_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1731928068&amp;width=680&amp;sig=8bLh1YhYCZ7nB%2BaYNPvUGcUuOLyrbsE2Sxcwtdc4G%2F0%3D" alt="" /></figure>
</div>
<p>On top of this, we will also:</p>
<p><span class="bold">Create Better Packaging: </span>We’ll design premium packaging that not only protects your BLEShark Nano but also elevates your unboxing experience. The new packaging will feature an amazing design with eco-friendly materials and organized compartments for each accessory.</p>
<h4 id="h:-7-500-Infrared-Control-Capability-" class="page-anchor">(<span class="bold">$7,500) Infrared Control Capability</span></h4>
<p>Hitting this goal unlocks an all-new infrared transceiver, allowing BLEShark Nano to control a wide range of electronics like TVs, air conditioners, LED lights, and stereo systems. We’ll also include a preset library for easy setup, adding powerful new functionality not available in the original version.</p>
<h4 id="h:-10-000-Expanded-Color-Choices" class="page-anchor"><span class="bold">($10,000) Expanded Color Choices</span></h4>
<p>At this level, we’ll introduce more color options, including a transparent case and a crisp, modern white. These additional colors let you personalize your BLEShark Nano to your style.</p>
<h4 id="h:-12-500-Custom-Silicone-Protection" class="page-anchor"><span class="bold">($12,500) Custom Silicone Protection</span></h4>
<p>When we reach our final goal, we’ll introduce a durable, soft silicone case custom-fitted for the BLEShark Nano. Choose from a range of colors to add a unique, protective touch to your device. As a token of our appreciation, every backer will receive <span class="bold">30% off</span> the silicone bumper! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f60e.png" alt="😎" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<div class="template asset" contenteditable="false" data-alt-text="Roadmap" data-caption="" data-id="46996474">
<figure class="image">
<h3 id="h:Roadmap" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/996/474/253cf9cc4a34e1998996c9b3881fcf6f_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729678791&amp;width=680&amp;sig=1XxzlEShU5SaCdex%2BQMS98KdA6YOzgQM16eO3S8zh%2Bk%3D" alt="Roadmap" /></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="" data-id="46996941">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/996/941/5d348f5fbe798642effe0474482fb4fe_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729681750&amp;width=680&amp;sig=3CKvwOtbJwuTZ%2BjRey0kkU9iPBVj7wg9%2FaubIsUcd2M%3D" alt="" /></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="Previous Prototypes" data-caption="" data-id="46987336">
<figure class="image">
<h3 id="h:Previous-Prototypes" class="invisible page-anchor"></h3>
<p><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/987/336/2bc89d881e1342b7bbe7ce4f03d5381e_original.png?fit=scale-down&amp;origin=ugc&amp;q=100&amp;v=1729624470&amp;width=680&amp;sig=p3mZmStz7wzcTx07h%2B2GU8IhjfGreYJF6mv62X0CCww%3D" alt="Previous Prototypes" /></figure>
</div>
<p>To craft the best BLEShark Nano possible, we had to create a <span class="bold">lot</span> of prototypes. Each of these prototypes helped shape the final product. Here are some of the prototypes we&#8217;ve built:</p>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="First prototype and video of the BLEShark Nano." data-id="46988718">
<figure class="image"><img decoding="async" class="fit js-lazy-image" src="https://i.kickstarter.com/assets/046/988/718/83367d6cc4945af85fe15fcd3ade178f_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729628944&amp;width=680&amp;sig=yjHtU8H6gGoxmj5YZudnmcspBK2UZkZdfoH7w9BCXlg%3D" alt="" data-src="https://i.kickstarter.com/assets/046/988/718/83367d6cc4945af85fe15fcd3ade178f_original.gif?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729628944&amp;width=680&amp;sig=yjHtU8H6gGoxmj5YZudnmcspBK2UZkZdfoH7w9BCXlg%3D" /><figcaption class="px2">First prototype and video of the BLEShark Nano.</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="First fully functional BLEShark Nano (ignore the rough print—it’s all about progress!)" data-id="46988851">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/988/851/5b135465a95ccd0127a0e007be5aaa5d_original.jpg?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729629482&amp;width=680&amp;sig=%2FXqAjRQTSW6i9AbUQ0m5nnqNjiOfqxJkisWT3MlmJuE%3D" alt="" /><figcaption class="px2">First fully functional BLEShark Nano (ignore the rough print—it’s all about progress!)</figcaption></figure>
</div>
<div class="template asset" contenteditable="false" data-alt-text="" data-caption="Some of the 3D printed prototypes" data-id="46988781">
<figure class="image"><img decoding="async" class="fit" src="https://i.kickstarter.com/assets/046/988/781/b3b481cf62eabd2b6fd2f53f1beb8712_original.jpg?fit=scale-down&amp;origin=ugc&amp;q=92&amp;v=1729629178&amp;width=680&amp;sig=FAScux7uZxbSdFN8t79SSiIrOfWEZ7Zj59taeiHKDtc%3D" alt="" /><figcaption class="px2">Some of the 3D printed prototypes</figcaption></figure>
</div>
<p>We’re excited to continue pushing boundaries with each new update, ensuring the BLEShark Nano grows with you. And with its blend of cutting-edge features, ease of use, and affordability, it’s more than just a tool—it’s a gateway to innovation.</p>
<p>So whether you’re testing Bluetooth vulnerabilities, creating custom Wi-Fi networks, or just passing the time with some games, the BLEShark Nano has you covered.</p>
<p>Note: USB-C cable not included with shipment. Another note: This is a prototype of the final product, some hardware features may vary. <a href="https://www.kickstarter.com/projects/infishark/bleshark-nano-a-compact-wireless-multi-tool-for-hackers" target="_blank" rel="noopener">source</a></p>
<p>Check out our github repo for more information INCLUDING source code: <a href="https://github.com/grdashark/BLEShark" target="_blank" rel="noopener">https://github.com/grdashark/BLEShark</a></p>
<p>GET YOUR <a href="https://infishark.com/products/bleshark-nano">HERE</a></p>
<p>&nbsp;</p>
<p><a href="https://infishark.com/products/bleshark-nano"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20338" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/932b93b98bca536f344df56902f89f86_original-1.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/932b93b98bca536f344df56902f89f86_original-1.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/932b93b98bca536f344df56902f89f86_original-1-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20318" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/7ae701e2d50e7ceaa6e41ee30896e707_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/7ae701e2d50e7ceaa6e41ee30896e707_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/7ae701e2d50e7ceaa6e41ee30896e707_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20339" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/7b48a88f05af4335c46ebf5e7ef7bfbf_original-1.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/7b48a88f05af4335c46ebf5e7ef7bfbf_original-1.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/7b48a88f05af4335c46ebf5e7ef7bfbf_original-1-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20320" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/49ca565d50121995b1aac7ee2d4ea972_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/49ca565d50121995b1aac7ee2d4ea972_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/49ca565d50121995b1aac7ee2d4ea972_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20321" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/42b9d026c78863d6d0ab09068dada62d_original.gif" alt="" width="600" height="338" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20322" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/e3ba04a7062de5769092d9e292159711_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/e3ba04a7062de5769092d9e292159711_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/e3ba04a7062de5769092d9e292159711_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20324" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/dab34c4f11a5452c85b97751bf3dd53e_original.gif" alt="" width="600" height="338" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20325" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/f58d9c3cc6fe4c95c19c7a9945f100b1_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/f58d9c3cc6fe4c95c19c7a9945f100b1_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/f58d9c3cc6fe4c95c19c7a9945f100b1_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20326" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/25b31c30ea9d9b055f98663296d692a2_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/25b31c30ea9d9b055f98663296d692a2_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/25b31c30ea9d9b055f98663296d692a2_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20327" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/431cc7e4965537c2d33eb8df59259834_original.gif" alt="" width="600" height="338" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20328" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/04e6fa45e237cb094f099d8097f64254_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/04e6fa45e237cb094f099d8097f64254_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/04e6fa45e237cb094f099d8097f64254_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20329" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/351a55d0620176633edc0fbcfa85198e_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/351a55d0620176633edc0fbcfa85198e_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/351a55d0620176633edc0fbcfa85198e_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20330" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20340" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original-1.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original-1.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original-1-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20330" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/098de4e2fdf4e2ed33cd542dda029be5_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20331" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/fa71a24b0012b76bbd133d2f73fbe480_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20332" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/240c890e78ba37791171004f26e73478_original.avif" alt="" width="680" height="42" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/240c890e78ba37791171004f26e73478_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/240c890e78ba37791171004f26e73478_original-400x25.avif 400w" sizes="(max-width: 680px) 100vw, 680px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20334" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/cc87acd75e93f18465c264e23e2eeb9a_original-1.webp" alt="" width="600" height="338" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20333" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/cc87acd75e93f18465c264e23e2eeb9a_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/cc87acd75e93f18465c264e23e2eeb9a_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/cc87acd75e93f18465c264e23e2eeb9a_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20335" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/faa6ae439205d2452ef13c645bb4cba0_original.avif" alt="" width="680" height="880" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/faa6ae439205d2452ef13c645bb4cba0_original.avif 680w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/faa6ae439205d2452ef13c645bb4cba0_original-309x400.avif 309w" sizes="(max-width: 680px) 100vw, 680px" /><img decoding="async" class="alignnone size-full wp-image-20336" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/5d348f5fbe798642effe0474482fb4fe_original.avif" alt="" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20337" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/83367d6cc4945af85fe15fcd3ade178f_original.webp" alt="" width="600" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/83367d6cc4945af85fe15fcd3ade178f_original.webp 600w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/83367d6cc4945af85fe15fcd3ade178f_original-400x225.webp 400w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/05/The-Truth-The-concept-of-law-rules-and-morality-require-equality.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Access ANY Network (remotely) What is a Hacker Dropbox?</title>
		<link>https://goodshepherdmedia.net/access-any-network-remotely-what-is-a-hacker-dropbox/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 04:49:03 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[Access ANY Network]]></category>
		<category><![CDATA[Access ANY Network remotely]]></category>
		<category><![CDATA[Family HelpDesk Support]]></category>
		<category><![CDATA[Hacker Dropbox]]></category>
		<category><![CDATA[NetworkAccess]]></category>
		<category><![CDATA[RaspberryPi]]></category>
		<category><![CDATA[twingate]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19809</guid>

					<description><![CDATA[Access ANY Network (remotely) What is a Hacker Dropbox? What is a Hacker Dropbox? (and why you need one….even if you aren’t a hacker) Build your Hacker Dropbox with Twingate (it’s free): https://ntck.co/twingate_ztna 💻 Raspberry Pi Imager: https://www.raspberrypi.com/software/ 🛒 Buy a Raspberry Pi: Raspberry Pi 4: amazon.com Raspberry Pi 5: amazon.com Here is a great definition from [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="post-content">
<h1>Access ANY Network (remotely) What is a Hacker Dropbox?</h1>
<h2 id="what-is-a-hacker-dropbox-and-why-you-need-oneeven-if-you-arent-a-hacker">What is a <em>Hacker Dropbox</em>? (and why you need one….even if you aren’t a hacker)</h2>
<p><iframe title="Access ANY Network (remotely)" width="640" height="360" src="https://www.youtube.com/embed/1lZ3FQSv-wI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><span class="yt-core-attributed-string--link-inherit-color" dir="auto"> Build your Hacker Dropbox with Twingate (it’s free): <a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbC1VYTZIemJjdHlLUHlFODBRS1VwYjRRdXc3d3xBQ3Jtc0trRGFGT1ptQVh5V2dUTlExMkNHZ1QyZEhtTV9FdFEzZjBfWXNDWkZBemRJdmdmdUstTlM2M0hhMmRrQWZ6dTRxVk1aMjJkVFFJODZSS1VwOG01LUV0V09uTWRKSHMzbEwxSDFGOHlYZmJVZGNjaWZFVQ&amp;q=https%3A%2F%2Fntck.co%2Ftwingate_ztna&amp;v=1lZ3FQSv-wI" target="_blank" rel="nofollow noopener">https://ntck.co/twingate_ztna</a><br />
<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4bb.png" alt="💻" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Raspberry Pi Imager: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbm9EUkI2a1cyVjMxSUNud1JQSHl6VGM4YnRnd3xBQ3Jtc0tsOHYyTVd6d09UWk43MHgzSThoZnRnR3EyQkdKSXkxZ2VEMGJ5ckt6S0ZlUWFXTEdabmlhRGZ2TE9OV2V4d1ZfejVtODFtVEZrT28wVXZnQlhWX1BSSUg4TEs1V01qaGZGZE15Qnktb3Y5NlhlMWJ4VQ&amp;q=https%3A%2F%2Fwww.raspberrypi.com%2Fsoftware%2F&amp;v=1lZ3FQSv-wI" target="_blank" rel="nofollow noopener">https://www.raspberrypi.com/software/</a></span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><br />
<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6d2.png" alt="🛒" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Buy a Raspberry Pi: Raspberry Pi 4: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.amazon.com/CanaKit-Raspberry-4GB-Starter-Kit/dp/B07V5JTMV9/?th=1" target="_blank" rel="nofollow noopener">amazon.com</a></span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><br />
Raspberry Pi 5: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.amazon.com/CanaKit-Raspberry-Starter-Kit-PRO/dp/B0CRSPKPNG?th=1" target="_blank" rel="nofollow noopener">amazon.com</a></span></p>
<ul>
<li>Here is a great definition from ChatGPT: <em>a small, discreet, and often portable device designed to be covertly placed in a target network to provide remote access for a hacker or penetration tester. It typically contains hardware and software configured to exploit the network or collect sensitive information.</em></li>
<li>If you’re a hacker…this is a no brainer. Get instant access to a remote network by dropping off a device. But….if you’re not a hacker…why do you need this?</li>
</ul>
<h3 id="family-helpdesk-support">Family HelpDesk Support</h3>
<ul>
<li>If you’re like me, you are likely the official technical support for your family and friends. I also inherited the role of helpdesk support for my church…these kinds of things just happen by default when you are in tech and people find out about your technical skills.</li>
<li>This isn’t an easy thing to do, especially when it comes to troubleshooting networks for your family. Is the network up? Why is it slow? Sometimes a FaceTime call just isn’t going to cut it.</li>
<li>If I’m going to be the support for my church and family, I’m going to take my role seriously. I need FULL control of the remote network……no more playing around!!!</li>
<li>With the <em>Hacker Dropbox</em>, I can drop off a small device, in my case it’s going to be a Raspberry Pi 4. (it can be a lot of things, as long as the device is Linux-based and is 64-bit). Instantly I get access to this remote network, enabling me to provide remote support and access any device.</li>
</ul>
<h3 id="this-is-not-vpn">This is NOT VPN</h3>
<ul>
<li>This is not a VPN (VIrtual Private Network) solution….it’s much better.</li>
<li>This is a ZTNA (Zero-Trust Network Access) solution. It’s called Twingate and I’ve been using them for a long time in my business and personal networks. I talk more about them in the video above but in short, they allow you to get and give remote access to networks in the most secure way. They are used by everyone from large enterprises to homelabbers looking to access their Plex server.</li>
<li>This isn’t the first video I’ve made about them but this is the first time I’ve featured a use-case like this.</li>
<li>Oh, it’s also <strong>FREE</strong> for home labbers. (And…cough….businesses that don’t have a ton of employees….like me.)</li>
</ul>
<h3 id="you-dont-need-to-know-anything-about-the-network">You don’t need to know ANYTHING about the network</h3>
<ul>
<li>I wanted this to be a turnkey solution even if you don’t know anything about the remote network. All you’ll have to do is plug in an ethernet cable (or connect to wifi….but you’ll need to know the SSID and password) and you will know everything you need to know about that network…..but how?</li>
<li>Twingate has a powerful API that allows us to do many things…including write python scripts that will automagically tell us the private IP address of our <em>Hacker Dropbox</em> (Raspberry Pi) and the Public IP address of the network, giving us instant access to this <em>Hacker Dropbox</em> AND the network.</li>
<li>This guide will contain that script.</li>
</ul>
<h2 id="what-do-you-need">What do you need?</h2>
<ul>
<li>Any Linux-based 64-bit system will do. You’ll need at least 1 CPU and 2GB RAM (recommended)…but you can go as low as 512MB of RAM.</li>
<li>You can also run this as a Docker container, which is my favorite way to deploy this in my home lab.</li>
<li>In this example, with the <em>Hacker Dropbox</em>, I’m using a Raspberry Pi 4 running Raspberry Pi OS Lite &#8211; 64-bit and installing it directly on the system (no docker container)</li>
</ul>
<h3 id="what-other-hardware-options-do-i-have">What other hardware options do I have?</h3>
<p>Again, this can be many things, but here are some ideas to get the juices flowing:</p>
<ul>
<li>ZImaboard</li>
<li>Raspberry Pi 4/5</li>
<li>Raspberry Pi 400/500</li>
<li>Old laptops</li>
<li>NAS</li>
<li>Intel NUC or other mini-pcs</li>
</ul>
<h1 id="the-tutorial">The Tutorial</h1>
<h2 id="step-1---setup-twingate">Step 1 &#8211; Setup Twingate</h2>
<p>This setup is VERY easy and is all done in the cloud.</p>
<ul>
<li>Sign up for Twingate here: <a href="https://ntck.co/twingate_ztna">https://ntck.co/twingate_ztna</a>
<ul>
<li>You’ll create a new Twingate network</li>
</ul>
</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19830" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1024x843.png" alt="" width="640" height="527" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1024x843.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-400x329.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-768x632.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1536x1264.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613.png 1738w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-2---add-your-first-remote-network">Step 2 &#8211; Add your first remote network</h2>
<p>You will be prompted to go through a wizard, we can skip that for now.</p>
<ul>
<li>Click on <em>Remote Networks</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19829" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1024x377.png" alt="" width="640" height="236" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1024x377.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-400x147.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-768x283.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1536x565.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739.png 1592w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>And then add a <em>Remote Network</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19828" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1024x407.png" alt="" width="640" height="254" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1024x407.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-400x159.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-768x305.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1536x611.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803.png 1932w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Choose <em>on-premise</em> for location</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19827" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-1024x736.png" alt="" width="640" height="460" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-1024x736.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-400x287.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-768x552.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825.png 1244w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Once created, we’ll click on the remote network link to jump in and add more config…like adding a connector.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19826" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1024x564.png" alt="" width="640" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1024x564.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-400x220.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-768x423.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1536x846.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905.png 1616w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-25---prep-your-hacker-dropbox">Step 2.5 &#8211; Prep your <em>Hacker Dropbox</em></h2>
<ul>
<li>This will vary based on what device you choose but this will normally involve installing a compatible OS (64-bit Linux OS) and getting access to your device via CLI.</li>
<li>I demo flashing an SD-card for the Raspberry Pi 4 in the video.</li>
</ul>
<h2 id="step-3---adding-a-connector-for-your-remote-network">Step 3 &#8211; Adding a connector for your remote network</h2>
<p>The connector, in our case, will be the <em>Hacker Dropbox</em>, a linux-based device running Twingate software, aka, <em>The Connector</em></p>
<ul>
<li>Click on <em>Deploy Connector</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19825" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-1024x820.png" alt="" width="640" height="513" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-1024x820.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-400x320.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-768x615.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010.png 1504w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Good practice, run <code>sudo apt update</code> to make sure all your repos are up-to-date (this will different for you if you are running something that isn’t Debian-based)</li>
<li>For the Raspberry Pi example, we are installing the Twingate connector directly on the OS, no container. So we’ll select Linux as our option.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19824" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1024x589.png" alt="" width="640" height="368" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1024x589.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-400x230.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-768x442.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1536x883.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353.png 1816w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Now, generate your access tokens. These will automatically be added the command we’ll use to install Twingate here in a moment.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19823" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1024x541.png" alt="" width="640" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1024x541.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-400x211.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-768x406.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1536x812.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428.png 1740w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Copy the provided command</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19822" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1024x518.png" alt="" width="640" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1024x518.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-400x202.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-768x389.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1536x777.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458.png 1826w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Paste that command in your terminal and watch the magic happen.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19821" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png" alt="" width="640" height="253" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-400x158.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-768x304.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1536x608.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521.png 2048w" sizes="(max-width: 640px) 100vw, 640px" /><img loading="lazy" decoding="async" class="alignnone size-large wp-image-19821" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png" alt="" width="640" height="253" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-400x158.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-768x304.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1536x608.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521.png 2048w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19820" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1024x611.png" alt="" width="640" height="382" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1024x611.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-400x239.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-768x458.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1536x916.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536.png 1948w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>We are actually….done. Check Twingate to see if your connector is up.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19819" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1024x566.png" alt="" width="640" height="354" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1024x566.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-400x221.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-768x424.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1536x848.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621.png 1550w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-4---add-a-remote-wifi-network-if-not-using-ethernet">Step 4 &#8211; Add a remote WiFi Network (if not using ethernet)</h2>
<ul>
<li>This will be Raspberry Pi specific.</li>
<li>Run this command to access the NetworkManager TUI</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> nmtui
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Edit a connection</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-medium wp-image-19818" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-400x339.png" alt="" width="400" height="339" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-400x339.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-768x652.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842.png 884w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<ul>
<li>Select Add</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19817" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-1024x823.png" alt="" width="640" height="514" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-1024x823.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-400x321.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-768x617.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856.png 1202w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Select WiFi</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19816" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1024x525.png" alt="" width="640" height="328" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1024x525.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-400x205.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-768x394.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1536x788.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917.png 1798w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Add SSID and Password (you’ll need to know this for the remote network)</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19815" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1024x506.png" alt="" width="640" height="316" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1024x506.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-400x198.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-768x379.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1536x758.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943.png 1936w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Select <em>Ok</em> and then hit <em>ESC</em> to save and get out of there.</li>
</ul>
<h2 id="step-5---use-the-twingate-api-to-learn-about-the-remote-network">Step 5 &#8211; Use the Twingate API to learn about the remote network</h2>
<p>You only need this option if this is a network you are unfamiliar with. So, for example, you might be offering remote support for your family and you will likely already know their network, 192.168.1.0/24 (for example) and you may have set the static IP address of your <em>Hacker Dropbox</em> and can easily, manually add this as a resource in Twingate.</p>
<ul>
<li>Generate an API token</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19814" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1024x704.png" alt="" width="640" height="440" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1024x704.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-400x275.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-768x528.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1536x1056.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238.png 1940w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Our script will be provisioning resources so we’ll need to give it a good amount of access.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19813" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-1024x934.png" alt="" width="640" height="584" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-1024x934.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-400x365.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-768x701.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315.png 1116w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Copy that key and put it somewhere safe.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19812" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-1024x878.png" alt="" width="640" height="549" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-1024x878.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-400x343.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-768x658.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347.png 1094w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h3 id="run-the-python-script">Run the Python Script</h3>
<ul>
<li>You’ll need another computer, can be anything that can run Python. (which…can be anything, Windows, Mac, Linux.)</li>
<li>You’ll also need Python3 installed, refer to your OS-specific documentation to install Python.</li>
</ul>
<h4 id="create-the-script">Create the script</h4>
<ul>
<li>Create a new python script</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">nano</span> twingate.py
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>paste the following script</li>
<li>Replace the following variables:
<ul>
<li><strong>API_URL</strong></li>
<li><strong>API_KEY</strong></li>
<li><strong>TARGET_NETWORK_NAME</strong></li>
</ul>
</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-python" tabindex="0"><code class=" language-python" data-lang="python"><span class="token keyword keyword-from">from</span> gql <span class="token keyword keyword-import">import</span> gql<span class="token punctuation">,</span> Client
<span class="token keyword keyword-from">from</span> gql<span class="token punctuation">.</span>transport<span class="token punctuation">.</span>requests <span class="token keyword keyword-import">import</span> RequestsHTTPTransport

<span class="token comment"># Twingate API settings</span>
API_URL <span class="token operator">=</span> <span class="token string">"https://****your Twingate network here****.twingate.com/api/graphql/"</span>  <span class="token comment"># Replace &lt;subdomain&gt; with your Twingate subdomain</span>
API_KEY <span class="token operator">=</span> <span class="token string">"YOUR TWINGATE API KEY"</span>
TARGET_NETWORK_NAME <span class="token operator">=</span> <span class="token string">"YOUR REMOTE NETWORK"</span>  <span class="token comment"># Replace with your target network name</span>

QUERY_REMOTE_NETWORKS <span class="token operator">=</span> gql<span class="token punctuation">(</span><span class="token triple-quoted-string string">"""
query GetRemoteNetworkDetails {
  remoteNetworks(after: null, first: 10) {
    edges {
      node {
        id
        name
        connectors {
          edges {
            node {
              id
              name
              publicIP
              privateIPs
              remoteNetwork {
                id
                name
              }
            }
          }
        }
      }
    }
  }
}
"""</span><span class="token punctuation">)</span>

MUTATION_CREATE_RESOURCE <span class="token operator">=</span> gql<span class="token punctuation">(</span><span class="token triple-quoted-string string">"""
mutation CreateResource($name: String!, $address: String!, $remoteNetworkId: ID!) {
  resourceCreate(
    name: $name,
    address: $address,
    remoteNetworkId: $remoteNetworkId
  ) {
    ok
    error
    entity {
      id
      name
      address {
        type
        value
      }
    }
  }
}
"""</span><span class="token punctuation">)</span>

<span class="token keyword keyword-def">def</span> <span class="token function">setup_client</span><span class="token punctuation">(</span><span class="token punctuation">)</span><span class="token punctuation">:</span>
    transport <span class="token operator">=</span> RequestsHTTPTransport<span class="token punctuation">(</span>
        url<span class="token operator">=</span>API_URL<span class="token punctuation">,</span>
        headers<span class="token operator">=</span><span class="token punctuation">{</span><span class="token string">"X-API-KEY"</span><span class="token punctuation">:</span> API_KEY<span class="token punctuation">}</span><span class="token punctuation">,</span>
        use_json<span class="token operator">=</span><span class="token boolean">True</span><span class="token punctuation">,</span>
    <span class="token punctuation">)</span>
    <span class="token keyword keyword-return">return</span> Client<span class="token punctuation">(</span>transport<span class="token operator">=</span>transport<span class="token punctuation">,</span> fetch_schema_from_transport<span class="token operator">=</span><span class="token boolean">True</span><span class="token punctuation">)</span>

<span class="token keyword keyword-def">def</span> <span class="token function">get_target_network</span><span class="token punctuation">(</span>client<span class="token punctuation">)</span><span class="token punctuation">:</span>
    response <span class="token operator">=</span> client<span class="token punctuation">.</span>execute<span class="token punctuation">(</span>QUERY_REMOTE_NETWORKS<span class="token punctuation">)</span>
    <span class="token keyword keyword-for">for</span> edge <span class="token keyword keyword-in">in</span> response<span class="token punctuation">[</span><span class="token string">"remoteNetworks"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"edges"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        network <span class="token operator">=</span> edge<span class="token punctuation">[</span><span class="token string">"node"</span><span class="token punctuation">]</span>
        <span class="token keyword keyword-if">if</span> network<span class="token punctuation">[</span><span class="token string">"name"</span><span class="token punctuation">]</span> <span class="token operator">==</span> TARGET_NETWORK_NAME<span class="token punctuation">:</span>
            <span class="token keyword keyword-return">return</span> network
    <span class="token keyword keyword-return">return</span> <span class="token boolean">None</span>

<span class="token keyword keyword-def">def</span> <span class="token function">create_resource</span><span class="token punctuation">(</span>client<span class="token punctuation">,</span> name<span class="token punctuation">,</span> address_value<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span><span class="token punctuation">:</span>
    params <span class="token operator">=</span> <span class="token punctuation">{</span>
        <span class="token string">"name"</span><span class="token punctuation">:</span> name<span class="token punctuation">,</span>
        <span class="token string">"address"</span><span class="token punctuation">:</span> address_value<span class="token punctuation">,</span>
        <span class="token string">"remoteNetworkId"</span><span class="token punctuation">:</span> remote_network_id
    <span class="token punctuation">}</span>
    response <span class="token operator">=</span> client<span class="token punctuation">.</span>execute<span class="token punctuation">(</span>MUTATION_CREATE_RESOURCE<span class="token punctuation">,</span> variable_values<span class="token operator">=</span>params<span class="token punctuation">)</span>
    <span class="token keyword keyword-if">if</span> <span class="token keyword keyword-not">not</span> response<span class="token punctuation">[</span><span class="token string">"resourceCreate"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"ok"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        <span class="token keyword keyword-raise">raise</span> Exception<span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Failed to create resource: </span><span class="token interpolation"><span class="token punctuation">{</span>response<span class="token punctuation">[</span><span class="token string">'resourceCreate'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'error'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
    <span class="token keyword keyword-return">return</span> response<span class="token punctuation">[</span><span class="token string">"resourceCreate"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"entity"</span><span class="token punctuation">]</span>

<span class="token keyword keyword-def">def</span> <span class="token function">automate_resource_creation</span><span class="token punctuation">(</span><span class="token punctuation">)</span><span class="token punctuation">:</span>
    client <span class="token operator">=</span> setup_client<span class="token punctuation">(</span><span class="token punctuation">)</span>

    <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Searching for target network: </span><span class="token interpolation"><span class="token punctuation">{</span>TARGET_NETWORK_NAME<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
    target_network <span class="token operator">=</span> get_target_network<span class="token punctuation">(</span>client<span class="token punctuation">)</span>

    <span class="token keyword keyword-if">if</span> <span class="token keyword keyword-not">not</span> target_network<span class="token punctuation">:</span>
        <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Network '</span><span class="token interpolation"><span class="token punctuation">{</span>TARGET_NETWORK_NAME<span class="token punctuation">}</span></span><span class="token string">' not found."</span></span><span class="token punctuation">)</span>
        <span class="token keyword keyword-return">return</span>

    <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Found network: </span><span class="token interpolation"><span class="token punctuation">{</span>target_network<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
    remote_network_id <span class="token operator">=</span> target_network<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span>

    <span class="token keyword keyword-for">for</span> connector_edge <span class="token keyword keyword-in">in</span> target_network<span class="token punctuation">[</span><span class="token string">"connectors"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"edges"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        connector <span class="token operator">=</span> connector_edge<span class="token punctuation">[</span><span class="token string">"node"</span><span class="token punctuation">]</span>
        public_ip <span class="token operator">=</span> connector<span class="token punctuation">.</span>get<span class="token punctuation">(</span><span class="token string">"publicIP"</span><span class="token punctuation">)</span>
        private_ips <span class="token operator">=</span> connector<span class="token punctuation">.</span>get<span class="token punctuation">(</span><span class="token string">"privateIPs"</span><span class="token punctuation">,</span> <span class="token punctuation">[</span><span class="token punctuation">]</span><span class="token punctuation">)</span>

        <span class="token keyword keyword-if">if</span> public_ip<span class="token punctuation">:</span>
            resource_name <span class="token operator">=</span> <span class="token string-interpolation"><span class="token string">f"Resource-Public-</span><span class="token interpolation"><span class="token punctuation">{</span>public_ip<span class="token punctuation">.</span>replace<span class="token punctuation">(</span><span class="token string">'.'</span><span class="token punctuation">,</span> <span class="token string">'-'</span><span class="token punctuation">)</span><span class="token punctuation">}</span></span><span class="token string">"</span></span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Creating Resource for public IP: </span><span class="token interpolation"><span class="token punctuation">{</span>public_ip<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
            resource <span class="token operator">=</span> create_resource<span class="token punctuation">(</span>client<span class="token punctuation">,</span> resource_name<span class="token punctuation">,</span> public_ip<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Resource created: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string"> (ID: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">, Address: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'address'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'value'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">)"</span></span><span class="token punctuation">)</span>

        <span class="token keyword keyword-for">for</span> private_ip <span class="token keyword keyword-in">in</span> private_ips<span class="token punctuation">:</span>
            resource_name <span class="token operator">=</span> <span class="token string-interpolation"><span class="token string">f"Resource-Private-</span><span class="token interpolation"><span class="token punctuation">{</span>private_ip<span class="token punctuation">.</span>replace<span class="token punctuation">(</span><span class="token string">'.'</span><span class="token punctuation">,</span> <span class="token string">'-'</span><span class="token punctuation">)</span><span class="token punctuation">}</span></span><span class="token string">"</span></span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Creating Resource for private IP: </span><span class="token interpolation"><span class="token punctuation">{</span>private_ip<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
            resource <span class="token operator">=</span> create_resource<span class="token punctuation">(</span>client<span class="token punctuation">,</span> resource_name<span class="token punctuation">,</span> private_ip<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Resource created: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string"> (ID: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">, Address: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'address'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'value'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">)"</span></span><span class="token punctuation">)</span>

<span class="token keyword keyword-if">if</span> __name__ <span class="token operator">==</span> <span class="token string">"__main__"</span><span class="token punctuation">:</span>
    <span class="token keyword keyword-try">try</span><span class="token punctuation">:</span>
        automate_resource_creation<span class="token punctuation">(</span><span class="token punctuation">)</span>
    <span class="token keyword keyword-except">except</span> Exception <span class="token keyword keyword-as">as</span> e<span class="token punctuation">:</span>
        <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Error: </span><span class="token interpolation"><span class="token punctuation">{</span>e<span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Save the file.</li>
</ul>
<h4 id="now-well-create-a-python-virtual-environment">Now, we’ll create a python virtual environment</h4>
<ul>
<li>This will make sure we can install packages and prerequisites without hurting your other projects. (if you have some….if you don’t…that’s okay….it’s just good practice)</li>
<li>First make sure you have it installed. See below for Linux.</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> <span class="token function">apt</span> <span class="token function">install</span> python3-venv -y
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Also make sure you install PIP</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> <span class="token function">apt</span> <span class="token function">install</span> python3-pip
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Now create a Python virtual environment and activate it.</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">python3 -m venv twingatesomething

<span class="token builtin class-name">source</span> twingatesomething/bin/activate
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Install the pre-reqs</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">pip <span class="token function">install</span> gql requests requests.toolbelt
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Type to run the script</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">python3 twingate.py
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Check your resources in Twingate…you should see something cool</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19811" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1024x609.png" alt="" width="640" height="381" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1024x609.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-400x238.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-768x457.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1536x914.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720.png 1856w" sizes="(max-width: 640px) 100vw, 640px" /></p>
</div>
<div class="pagination">
<div class="pagination__title"><a href="https://blog.networkchuck.com/posts/building-a-hacker-dropbox-access-any-network/" target="_blank" rel="noopener"><span class="pagination__title-h">source</span></a></div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Morris Worm? How One Man Accidentally Destroyed the Internet 30 Years Ago</title>
		<link>https://goodshepherdmedia.net/what-is-the-morris-worm-how-one-man-accidentally-destroyed-the-internet-30-years-ago/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 17:00:34 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Morris Worm]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19530</guid>

					<description><![CDATA[This Is How One Man Accidentally Destroyed the Internet 30 Years Ago It all started with the Morris worm. Pixabay Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how big the internet was — that is, how many devices were [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="cCV">
<div class="sWr">
<div class="GqV JD9">
<div class="gsz Ak6">
<div class="R1N ROm wfd">
<h1 class="aVX cS4">This Is How One Man Accidentally Destroyed the Internet 30 Years Ago</h1>
</div>
<div class="r87 uRt">
<h2>It all started with the Morris worm.</h2>
</div>
<div class="rAY _9O">
<div></div>
</div>
</div>
<div class="daF">
<div class="pxF oL7 YOh"><picture><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z geM" src="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="" /></picture></div>
</div>
<p><span class="Vms j29"><a href="https://pixabay.com/en/hacking-cyber-blackandwhite-crime-2903156/" target="_blank" rel="noopener noreferrer">Pixabay</a></span></p>
</div>
</div>
</div>
<div class="tn6">
<div class="AOL Afg" data-adroot="true">
<p>Back in November 1988, Robert Tappan Morris, son of the famous cryptographer <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">Robert Morris Sr.</a>, was a 20-something graduate student at Cornell who wanted to know <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">how big</a> the internet was — that is, how many devices were connected to it. So he wrote a program that would <a href="http://www.foo.be/docs-free/morris-worm/" target="_blank" rel="noopener noreferrer">travel from computer to computer</a> and ask each machine to send a signal back to a control server, which would keep count.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-1" data-google-query-id="CIjamtf9_4sDFY8I7wId-ZQQEg">
<div id="google_ads_iframe_/49944529/inverse/posts_0__container__">The program worked well — too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren’t enough to keep the program from <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">clogging up large sections of the internet</a>, both copying itself to new machines and sending those pings back. When he realized what was happening, even his <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">messages warning system administrators</a> about the problem couldn’t get through.</div>
</div>
</div>
<div class="sWr iGR">
<div class="yFJ">
<div class="jjV">
<div class="_Qy wmr">
<div id="jwplayer-video-1" class="jwplayer jw-reset jw-state-paused jw-stretch-uniform jw-flag-aspect-mode jw-breakpoint-5 jw-floating-dismissible jw-flag-ads jw-flag-ads-googleima jw-flag-user-inactive" tabindex="0" role="application" aria-label="Video Player - This Quantum Device Will Protect You From Cyberattacks to Make &quot;True&quot; Random Numbers">
<div class="jw-wrapper jw-reset">
<div class="jw-controls jw-reset">
<div class="jw-controlbar jw-reset">
<div class="jw-reset jw-button-container">
<div class="jw-reset jw-spacer">His program became the first of a particular type of <a href="https://www.inverse.com/article/48293-5g-future-cybersecurity-risks">cyberattack</a> called “<a href="https://theconversation.com/attackers-can-make-it-impossible-to-dial-911-67980" target="_blank" rel="noopener noreferrer">distributed denial of service</a>,” in which large numbers of internet-connected devices, including computers, <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">webcams</a>, and <a href="https://theconversation.com/police-around-the-world-learn-to-fight-global-scale-cybercrime-75804" target="_blank" rel="noopener noreferrer">other smart gadgets</a>, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-2" data-google-query-id="CMC61df9_4sDFWBZCAQdjKAwLA">
<div id="google_ads_iframe_/49944529/inverse/posts_1__container__">As the chair of the integrated <a href="https://cybersecurityprograms.indiana.edu/" target="_blank" rel="noopener noreferrer">Indiana University Cybersecurity Program</a>, I can report that these kinds of attacks are <a href="http://bwcio.businessworld.in/article/Verisign-releases-DDOS-Trends-Report-of-Q2-2018/05-10-2018-161517/" target="_blank" rel="noopener noreferrer">increasingly frequent</a> today. In many ways, Morris’s program, known to history as the “Morris worm,” set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3208018" target="_blank" rel="noopener noreferrer">Internet of Everything</a>.”</div>
</div>
</div>
<h2>Unpacking the Morris Worm</h2>
<p>Worms and <a href="https://www.inverse.com/article/44826-pig-virus-human-hosts-human-cells-study-shows">viruses</a> are similar but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book.</p>
<p>In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">halt the worm</a>. In that time, it infected tens of thousands of systems — about <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">10 percent of the computers then on the internet</a>. Cleaning up the infection cost <a href="https://en.wikipedia.org/wiki/Morris_worm#cite_note-6" target="_blank" rel="noopener noreferrer">hundreds or thousands of dollars</a> for each affected machine.</p>
<p>In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">people could catch the computer infection</a>. Sadly, many journalists as a whole <a href="https://medium.com/@davelee/reporting-on-cyberattacks-the-medias-urgent-problem-d6c450a3383a" target="_blank" rel="noopener noreferrer">haven’t gotten much more knowledgeable on the topic</a> in the intervening decades.</p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s-817845468"><picture><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z B9M" src="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="Robert Tappan Morris, in 2008." /></picture></div><figcaption class="rv9 tm3">
<div>
<p>Robert Tappan Morris, in 2008.</p>
</div>
<p><cite class="Afu _Nh"><a href="https://commons.wikimedia.org/wiki/File:Robert_Tappan_Morris.jpg" target="_blank" rel="noopener noreferrer">Trevor Blackwell/Wikimedia, CC BY-SA</a></cite></p>
</figcaption></figure>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-3" data-google-query-id="COiN19j9_4sDFYQ4RAgdtKYB9A">
<div id="google_ads_iframe_/49944529/inverse/posts_2__container__">Morris wasn’t trying to destroy the internet, but the worm’s widespread effects resulted in him being <a href="https://www.wired.com/2011/07/0726first-computer-fraud-indictment/" target="_blank" rel="noopener noreferrer">prosecuted</a> under the then-new <a href="https://theconversation.com/malwaretechs-arrest-sheds-light-on-the-complex-culture-of-the-hacking-world-82136" target="_blank" rel="noopener noreferrer">Computer Fraud and Abuse Act</a>. He was sentenced to three years of probation and a roughly $10,000 fine. In the late 1990s, though, he became a <a href="https://www.cnet.com/news/yahoo-buys-viaweb-for-49-million/" target="_blank" rel="noopener noreferrer">dot-com millionaire</a> — and is now a <a href="https://pdos.csail.mit.edu/%257Ertm/" target="_blank" rel="noopener noreferrer">professor at MIT</a>.</div>
</div>
</div>
<h2>Rising Threats</h2>
<p>The internet remains subject to much more frequent — and more crippling — DDoS attacks. With more than <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/" target="_blank" rel="noopener noreferrer">20 billion</a> devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding.</p>
<p>In October 2016, a DDoS attack using <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">thousands of hijacked webcams</a> — often used for security or baby monitors — <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank" rel="noopener noreferrer">shut down access to a number of important internet services</a> along the eastern US seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by <a href="https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/" target="_blank" rel="noopener noreferrer">software called Mirai</a>. Today’s internet is much larger, but not much more secure, than the internet of 1988.</p>
<p>Some things have actually gotten worse. Figuring out <a href="https://doi.org/10.1080/01402390.2014.977382" target="_blank" rel="noopener noreferrer">who is behind particular attacks</a> is not as easy as waiting for that person to get worried and <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">send out apology notes and warnings</a>, as Morris did in 1988. In some cases — the ones big enough to merit full investigations — it’s possible to identify the culprits. A trio of college students was ultimately found to have <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/" target="_blank" rel="noopener noreferrer">created Mirai to gain advantages</a> when playing the <em>Minecraft</em> computer game.</p>
<h2>Fighting DDoS Attacks</h2>
<p>But technological tools are not enough, and neither are laws and regulations about online activity — including the <a href="https://ssrn.com/abstract=2573787" target="_blank" rel="noopener noreferrer">law under which Morris was charged</a>. The dozens of state and federal cybercrime statutes on the books have <a href="https://phys.org/news/2018-02-cyberattacks-costly-worse.html" target="_blank" rel="noopener noreferrer">not yet seemed to reduce the overall number or severity</a> of attacks, in part because of the <a href="https://www.csoonline.com/article/3153707/security/top-cybersecurity-facts-figures-and-statistics.html" target="_blank" rel="noopener noreferrer">global nature</a> of the problem.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-4" data-google-query-id="CKq1rOL9_4sDFUzl_QUdBhsrdQ">
<div id="google_ads_iframe_/49944529/inverse/posts_3__container__">There are some efforts underway in Congress to <a href="https://www.fifthdomain.com/congress/policy/2018/10/12/support-for-hack-back-grows-after-trumps-pledge-to-get-aggressive-in-cyberspace/" target="_blank" rel="noopener noreferrer">allow attack victims in some cases to engage in active defense measures</a> — a <a href="https://www.lawfareblog.com/tagged/hacking-back" target="_blank" rel="noopener noreferrer">notion</a> that comes with a number of downsides, including the risk of escalation — and to <a href="https://www.reuters.com/article/us-usa-cyber-congress-idUSKBN1AH474" target="_blank" rel="noopener noreferrer">require better security</a> for internet-connected devices. But passage is far from assured.</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU">
<div id="ad-5" data-google-query-id="CLfExuL9_4sDFa78_QUdu4cnBg">
<div id="google_ads_iframe_/49944529/inverse/posts_4__container__">There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world’s first <a href="https://www.sei.cmu.edu/about/divisions/cert/index.cfm#history" target="_blank" rel="noopener noreferrer">Cyber Emergency Response Team</a>, which has been replicated <a href="https://www.us-cert.gov/" target="_blank" rel="noopener noreferrer">in the federal government</a> and <a href="http://www.internationalcybercenter.org/certicc/certworld" target="_blank" rel="noopener noreferrer">around the world</a>. Some policymakers are talking about establishing a <a href="https://www.securityweek.com/does-us-need-national-cybersecurity-safety-board" target="_blank" rel="noopener noreferrer">national cybersecurity safety board</a>, to <a href="https://theconversation.com/what-cybersecurity-investigators-can-learn-from-airplane-crashes-91177" target="_blank" rel="noopener noreferrer">investigate digital weaknesses and issue recommendations</a>, much as the National Transportation Safety Board does with <a href="https://www.inverse.com/article/49548-element-one-hydrogen-fuel-plane-2025">airplane</a> disasters.</div>
</div>
</div>
<p>More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of <a href="https://theconversation.com/notpetya-ransomware-attack-shows-corporate-social-responsibility-should-include-cybersecurity-79810" target="_blank" rel="noopener noreferrer">corporate social responsibility</a>, they — and their staff, customers, and business partners — would be safer.</p>
<p>In <a href="https://www.penguinrandomhouse.com/books/28148/3001-the-final-odyssey-by-arthur-c-clarke/9780345423498/" target="_blank" rel="noopener noreferrer"><em>3001: The Final Odyssey</em></a>, science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon — which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone — governments, companies, and individuals alike — to set up rules and programs that support widespread cybersecurity, without waiting another 30 years. <a href="https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris" target="_blank" rel="noopener">source</a></p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s1359406774"><picture><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" /></picture></div>
</figure>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
