I decided to create an updated version of Piranha based on OpenWRT 10.03.1 and orange's updated aap script from post #216. I have it working by doing the following:
1) Install OpenWRT 10.03.1
2) Install the following packages:
aircrack-ng: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
aircrack-ptw: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
zlib: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
libpthread: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
libopenssl: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
libpcap: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
kmod-tun: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
libreadline: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
libncurses: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
cifsmount: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
macchanger: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
kmod-nls-base: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
kmod-fs-cifs: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
screen: root@OpenWrt:~# opkg install http://downloads.openwrt.org/backfire/1 … theros.ipk
3) Create the following monitor and sta scripts and chmod 755 both scripts.
-----------------------
/bin/monitor :
-----------------------
#!/bin/sh
ifconfig -a | awk '/ath/ {print $1}' | while read x; do wlanconfig $x destroy; echo "madwifi-ng VAP $x destroyed"; done
wlanconfig ath0 create wlandev wifi0 wlanmode monitor > /dev/null
echo "madwifi-ng VAP ath0 created (wlanmode monitor)"
-----------------------
/bin/sta :
-----------------------
#!/bin/sh
ifconfig -a | awk '/ath/ {print $1}' | while read x; do wlanconfig $x destroy; echo "madwifi-ng VAP $x destroyed"; done
wlanconfig ath0 create wlandev wifi0 wlanmode sta > /dev/null
echo "madwifi-ng VAP ath0 created (wlanmode sta)"
4) Follow orange's instructions in his now infamous post #216. This will add the last published aap script from orange, its configuration file, and the original Piranha network and wireless configurations. After editing the network and wireless config files and rebooting, your router will behave like Piranha v4.
https://forum.openwrt.org/viewtopic.php … 97#p140797
So far I have tested the aap, monitor & sta scripts and monitor mode for scanning only. I haven't tried packet injection or capture yet.
(Last edited by technocrat on 12 Feb 2012, 16:43)