NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode

12/24/2015
by   Matthias Schulz, et al.
0

Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments. Monitor mode, which allows eavesdropping on all frames on a wireless communication channel, is a first step to lower this barrier. Use cases include, but are not limited to, network packet analyses, security research and testing of new medium access control layer protocols. Monitor mode is generally offered by SoftMAC drivers that implement the media access control sublayer management entity (MLME) in the driver rather than in the Wi-Fi chip. On smartphones, however, mostly FullMAC chips are used to reduce power consumption, as MLME tasks do not need to wake up the main processor. Even though, monitor mode is also possible in FullMAC scenarios, it is generally not implemented in today's Wi-Fi firmwares used in smartphones. This work focuses on bringing monitor mode to Nexus 5 smartphones to enhance the interoperability between applications that require monitor mode and BCM4339 Wi-Fi chips. The implementation is based on our new C-based programming framework to extend existing Wi-Fi firmwares.

READ FULL TEXT

page 1

page 4

research
06/28/2023

The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems

Power analysis is a class of side-channel attacks, where power consumpti...
research
05/02/2019

Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices

Bluetooth is among the dominant standards for wireless short-range commu...
research
09/07/2023

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

The contact-free sensing nature of Wi-Fi has been leveraged to achieve p...
research
01/29/2019

A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas

Air pollution is a major concern in large urban areas. Various studies h...
research
06/23/2021

Advancing Protocol Diversity in Network Security Monitoring

With information technology entering new fields and levels of deployment...
research
06/17/2020

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

Wireless communication standards and implementations have a troubled his...
research
05/12/2022

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

When an iPhone is turned off, most wireless chips stay on. For instance,...

Please sign up or login with your details

Forgot password? Click here to reset