psp based mitm sniffer

Discuss the development of new homebrew software, tools and libraries.

Moderators: cheriff, TyRaNiD

Post Reply
dowload
Posts: 3
Joined: Mon Sep 10, 2007 10:34 am

psp based mitm sniffer

Post by dowload »

I posted this on some other forums and was told to check here.
Would it be possible to write a non-promiscuous mode sniffer for the
PSP that simply captures all incoming packets, ie: intercept all incoming
pings.
Also, is it possible to craft ARP packets on the PSP?
My idea was to write a sniffer that uses ARP cache poisoning to create
a Man-In-The-Middle condition which would allow one to sniff packets
without using promiscuous mode.
Here is a link to the code I have written so far: http://intercon.ifastnet.com/files/main.c
And here is the sniffer it was based on:
http://hacktivist.net/index.php?page=sc ... scripts=41
Unfortunately, it is not capturing the incoming packets.
I have been looking up the sceIoIoctl function to see if this would help.
Does anyone know what I should try?

--download
califrag
Posts: 30
Joined: Wed Apr 04, 2007 4:43 pm

Post by califrag »

well i don't know anything about what you've posted above, BUT, here's something you can look into...

take a look at psputility_netparam.h

would it be possible make a call to

sceUtilitySetNetParam(int param, const void *val)

and pass PSP_NETPARAM_WEPKEY

I'm thinking you could generate WEP keys and brute force it until it connects... though there is no telling how long it may take to crack the WEP key. but I know the source for some key crackers are available (aircrack -ng)

let me know if you make any progress, interested in this myself!

just a thought
dowload
Posts: 3
Joined: Mon Sep 10, 2007 10:34 am

Post by dowload »

no, I meant to capture packets once already connected to the network,
not try to brute force WEP. That would be theoretically possible, but would
take an inordinate amount of time.
Viper8896
Posts: 110
Joined: Thu Jan 26, 2006 6:20 pm

Post by Viper8896 »

It would be great as a tool that worked as a team with another computer connected through the usb so the psp just does the capturing while the high performance computer does the cracking
dowload
Posts: 3
Joined: Mon Sep 10, 2007 10:34 am

Post by dowload »

It doesn't need to crack anything!
It's just sopposed to capture already incoming packets.
For example: you ping the PSP and those ICMP echo request
packets show up in the sniffer logs.
THIS HAS NOTHING TO DO WITH WEP CRACKING!
mojojojo
Posts: 33
Joined: Mon Jan 01, 2007 12:19 pm

Libertas!

Post by mojojojo »

dowload wrote:It doesn't need to crack anything!
It's just sopposed to capture already incoming packets.
For example: you ping the PSP and those ICMP echo request
packets show up in the sniffer logs.
THIS HAS NOTHING TO DO WITH WEP CRACKING!
I've been looking for a libpcap like sniffer capability for the PSP myself. (As a user, not a coder)

From my research, it seems like the stopping block is the wireless NIC technology they used. There are no obvious hooks into the low-level capabilities of the NIC.
http://jylam.info/psp/dev.html wrote:

PSP uses two chips for wifi stuff :

* Marvell Libertas 88W8010 - RF Transceiver
* Marvell Libertas 88W8380 - ARM9 Processor


It handles 802.11b and g (11 and 54Mbps), WEP and AES encryption (not sure for AES).

Unfortunately, there is no GPL'd Linux driver for this. A big problem, I've absolutely no experience in wlan drivers coding, and it seems Marvell released no documentation at all about its chip.x
If you've got driver/linux kung fu ... you can try here http://wiki.laptop.org/go/Libertas ...

Scroll down to links with some projects to reverse engineer libertas for various devices. I've looked at some of it but it is way out of my league.
Viper8896
Posts: 110
Joined: Thu Jan 26, 2006 6:20 pm

Re: Libertas!

Post by Viper8896 »

mojojojo wrote:
http://jylam.info/psp/dev.html wrote:
...It handles 802.11b and g (11 and 54Mbps)...
g/54Mbps?? erm don't think so.
adrahil
Posts: 274
Joined: Thu Mar 16, 2006 1:55 am

Post by adrahil »

The Marvell card the PSP got does :) But of course SCE are too cheap to extend their WLAN FW ;)
Viper8896
Posts: 110
Joined: Thu Jan 26, 2006 6:20 pm

Post by Viper8896 »

adrahil wrote:...SCE are too cheap to extend their WLAN FW ;)
is that the same fw as in
a. psp fw 3.52
or
b. something built on the wlan

if the answer is b is it writable and could it be a possibility it a new custom fw.
someone
Idiot
Posts: 71
Joined: Tue Sep 13, 2005 9:03 pm

Post by someone »

I believe that the Libertas ARM9/ARM7 combo with its own flash chip and a JTAG port is able to do a lot of nice stuff not already implemented.

But without specs or code written, it will be very hard to implement it.
tabularasa
Posts: 13
Joined: Wed Nov 22, 2006 12:28 am

Re: psp based mitm sniffer

Post by tabularasa »

dowload wrote: Here is a link to the code I have written so far: http://intercon.ifastnet.com/files/main.c
Hm doesn't really work for me that URL. But i like the idea of a working psp sniffer. More to come?

Edit:
Hm. Are there any other ways to hijack wifi connections more low level based than on ARP spoofing? I'm not that familiar with wifi so ...
http://monkey.org/~dugsong/dsniff/ should be a good starting point regarding arp spoofed packets. Maybe i got some more time later on to check code and try to figure out some things.
tabularasa
Posts: 13
Joined: Wed Nov 22, 2006 12:28 am

Post by tabularasa »

Hm. Unforunately when i try to send something over raw socket i get the errno error #121 = Remote I/O error.
My arp packet looks something like that:

Code: Select all

/*
    router: 192.168.2.1   (00:03:C9:A8:70:D5)
    laptop: 192.168.2.155 (00:01:36:0E:21:8E)
    psp:    192.168.2.102 (00:01:4A:A8:D8:18)
*/

const char atob[] = "\x00\x01\x36\x0E\x21\x8E" /* address to spoof (laptop)*/
                    "\x00\x01\x4a\xa8\xd8\x18" /* myself (psp) */
                    "\x08\x06"                 /* type: ARP */
                    "\x00\01"                  /* hardware type: ethernet */
                    "\x08\x00"                 /* prot. type: IP */
                    "\x06"                     /* hardware size: 6 */
                    "\x04"                     /* prot. size: 4 */
                    "\x00\x02"                 /* Opcode: reply */
                    "\x00\x01\x4a\xa8\xd8\x18" /* sender mac address (psp) */
                    "\xc0\xa8\x02\x01"         /* sender ip address (router) */
                    "\x00\x01\x36\x0E\x21\x8e" /* target mac address (laptop) */
                    "\xc0\xa8\x02\x9b";        /* target ip address (laptop) */

const char btoa[] = "\x00\x03\xc9\xa8\x70\xd5" /* address to spoof (router) */
                    "\x00\x01\x4a\xa8\xd8\x18" /* myself (psp) */
                    "\x08\x06"                 /* type: ARP */
                    "\x00\01"                  /* hardware type: ethernet */
                    "\x08\x00"                 /* prot. type: IP */
                    "\x06"                     /* hardware size: 6 */
                    "\x04"                     /* prot. size: 4 */
                    "\x00\x02"                 /* Opcode: reply */
                    "\x00\x01\x4a\xa8\xd8\x18" /* sender mac address (psp) */
                    "\xc0\xa8\x02\x9b"         /* sender ip address (laptop) */
                    "\x00\x03\xc9\xa8\x70\xd5" /* target mac address (router) */
                    "\xc0\xa8\x02\x01";        /* target ip address (router) */
User avatar
Gaby_64
Posts: 33
Joined: Fri Dec 19, 2008 4:04 am

No one working on this anymore

Post by Gaby_64 »

I posted this on some other forums and was told to check here.
Would it be possible to write a non-promiscuous mode sniffer for the
PSP that simply captures all incoming packets, ie: intercept all incoming
pings.
Also, is it possible to craft ARP packets on the PSP?
My idea was to write a sniffer that uses ARP cache poisoning to create
a Man-In-The-Middle condition which would allow one to sniff packets
without using promiscuous mode.
Here is a link to the code I have written so far: http://intercon.ifastnet.com/files/main.c
And here is the sniffer it was based on:
http://hacktivist.net/index.php?page=sc ... scripts=41
Unfortunately, it is not capturing the incoming packets.
I have been looking up the sceIoIoctl function to see if this would help.
Does anyone know what I should try?
The links dont work, does anyone know what was the sniffer he used
This technic is very much possible on psp to capture packets and hopefuly dump them into a cap file
User avatar
Wally
Posts: 663
Joined: Mon Sep 26, 2005 11:25 am

Re: No one working on this anymore

Post by Wally »

Gaby_64 wrote:
I posted this on some other forums and was told to check here.
Would it be possible to write a non-promiscuous mode sniffer for the
PSP that simply captures all incoming packets, ie: intercept all incoming
pings.
Also, is it possible to craft ARP packets on the PSP?
My idea was to write a sniffer that uses ARP cache poisoning to create
a Man-In-The-Middle condition which would allow one to sniff packets
without using promiscuous mode.
Here is a link to the code I have written so far: http://intercon.ifastnet.com/files/main.c
And here is the sniffer it was based on:
http://hacktivist.net/index.php?page=sc ... scripts=41
Unfortunately, it is not capturing the incoming packets.
I have been looking up the sceIoIoctl function to see if this would help.
Does anyone know what I should try?
The links dont work, does anyone know what was the sniffer he used
This technic is very much possible on psp to capture packets and hopefuly dump them into a cap file
This thread is two years old! Of course the links wont work.
No I have no idea
User avatar
Gaby_64
Posts: 33
Joined: Fri Dec 19, 2008 4:04 am

Post by Gaby_64 »

Well witch program would be the best to port that has arp spoofing capability's and captures packets

Anyway here is a link to my current progress: http://psp.wijou.com/forum/index.php?showtopic=815
User avatar
Gaby_64
Posts: 33
Joined: Fri Dec 19, 2008 4:04 am

Post by Gaby_64 »

Version 0.52 of my aircrack was released yesterday, its goty a working wep cap file decrypter that takes less then 10 seconds
User avatar
Gaby_64
Posts: 33
Joined: Fri Dec 19, 2008 4:04 am

Post by Gaby_64 »

Well Aircrack-PSP 0.544993 was released today

Does anyone look at this, reply, im still looking for that file

the one Download made (main.c) if you look at the first post
Dariusc123456
Posts: 388
Joined: Tue Aug 12, 2008 12:46 am

Post by Dariusc123456 »

Gaby,

Where the link on that site to download the latest version of Aircrack-psp?
User avatar
Gaby_64
Posts: 33
Joined: Fri Dec 19, 2008 4:04 am

Post by Gaby_64 »

Post Reply