Router Marshal

Total Page:16

File Type:pdf, Size:1020Kb

Router Marshal Patrick Leahy Center for Digital Investigation (LCDI) Router Marshal Written & Research by Maegan Katz 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu July 2013 Page 1 of 10 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents 1 Introduction .................................................................................................................................................................... 3 1.1 Background ............................................................................................................................................................. 3 1.2 Terminology ............................................................................................................................................................ 3 1.3 Research Questions ................................................................................................................................................. 4 1.4 Prior Work ............................................................................................................................................................... 4 2 Methodology and Methods ............................................................................................................................................ 4 2.1.1 Equipment Used .............................................................................................................................................. 4 2.1.2 Device Selection .............................................................................................................................................. 5 2.2 Router 1 - TP-Link .................................................................................................................................................... 6 2.3 Router 2 - NETGEAR ................................................................................................................................................ 6 2.3.1 Testing ............................................................................................................................................................. 6 2.4 Analysis ................................................................................................................................................................... 6 2.4.1 Attached Devices ............................................................................................................................................. 7 2.4.2 Router Log ....................................................................................................................................................... 7 2.4.3 Basic Internet Settings .................................................................................................................................... 7 2.4.4 Acquired Information for Router 2 ................................................................................................................. 8 3 Results ............................................................................................................................................................................. 8 4 Conclusion ....................................................................................................................................................................... 9 5 Further Work ................................................................................................................................................................... 9 6 References ...................................................................................................................................................................... 9 Page 2 of 10 Patrick Leahy Center for Digital Investigation (LCDI) 1 Introduction Routers connect all of the local devices together in a local network, making them crucial to investigations. A growing number of homes and business have some type of router or wireless access point, and in 2012, twenty- five percent of households worldwide had Wi-Fi.1 This research project will explore the forensic data that can be retrieved from home routers using Router Marshal, a program used to acquire data from routers and wireless access points. The software currently supports Linksys WRT54G/GC/GL/GS/G2, AG241, and WRT160N; NETGEAR RP114, WGR614, WNR1000, and WNR2000; D-Link TM-G5240 and WBR-2310; DD-WRT; Tomato firmware; and Cisco IOS routers. 1.1 Background Router Marshal is a digital forensic tool developed by ATC-NY that is used to “automatically acquire digital forensic evidence from network devices such as routers and wireless access points. An investigator can use the Router Marshal software in the field to identify a network device, automatically acquire volatile forensic evidence from the device, and view and interpret this evidence.”2 The software also maintains detailed logs of all activities and communications it performs with a target device. 1.2 Terminology Dynamic Domain Name System (DDNS): A protocol or method that updates a name server in the DNS. Dynamic Host Configuration Protocol (DHCP): A protocol that assigns IP addresses to new users. Internet Protocol (IP) Address: A unique string of numbers assigned to a device attached to a computer network and the Internet. It is an identifier of networked devices. Local Area Network (LAN): The networking of computers in close proximity to each other. An example is a school or office building. Nmap: A security scanning tool that is necessary for Router Marshal to run properly. Power Over Ethernet (POE) Connection: The method of passing electrical power and data through Ethernet cabling. Port Triggering: A way to automate port forwarding by allowing certain routers to automatically allow a host machine to forward a port back to itself. Router: A small physical device that joins multiple networks together; forwards data from one network to another. It allows communication between a local network and the Internet. Universal Plug and Play (UPnP): Internet protocols that allow for computers and handheld devices to communicate. 1 Callaham, J. (2012, April 05). Study: 25 Percent of All Households Use WiFi. Neowin. Retrieved July 15, 2013, from http://www.neowin.net/news/study-25-percent- of-all-households-use-wifi 2 Router Marshal™ Digital Forensic Software. (2010, December 22). Router Marshal™ Digital Forensic Software. Retrieved from http://routermarshal.com/ Page 3 of 10 Patrick Leahy Center for Digital Investigation (LCDI) Wide Area Network (WAN): The networking of computers in a large geographical area. This could include a number of LANs connected together. WinPcap: A packet capture and filtering engine application used in many networking tools. It is a necessary tool for Router Marshal to run properly. 1.3 Research Questions 1) What types of information are stored on a router? 2) What information can Router Marshal retrieve from a router? 3) Can network traffic data and connected device data be acquired from a router using Router Marshal? 1.4 Prior Work To our knowledge, there has been no prior work done with Router Marshal. There has been research done with similar programs such as Wireshark and Cain and Able, which are able to gather network traffic rather than acquiring the data from the router. 2 Methodology and Methods 2.1.1 Equipment Used Item Identifier Size/Specifications LCDI PC 1 Research-5 Running Router Marshal Version 1.0.1 Specs – Desktop, Intel Core i7-3770K CPU @ 3.50GHz, 16GB Memory, Windows 7 Enterprise SP1 MAC Address: BC:5F:F4:A3:4F:23 LCDI Laptop 1 HDLOADNER-04-2 Running Router Marshal Version 1.0.1 Specs – Laptop, Genuine Intel CPU T2400 @ 1.83GHz, 1GB Memory, Windows 7 Enterprise SP1 Test Computer 1 LCDI Testing Computer 3 Specs – Desktop, Pentium Dual-Core CPU E6500 @ 2.93GHz, 4GB Memory, Windows 7 Enterprise SP1 MAC Address: 6C:62:6D:B1:5D:1A IE, Firefox, and Chrome installed and used for generating data Test Tablet 1 Forensics 0028 iPad Version 6.1.2 Model # MC705LL/A MAC Address: 64:20:0C:6F:00:A4 Default web browser used for generating data Router 1 LCDI-EA-001 TP-Link 300Mbps Wireless N Router Model # TL-WR841N Router 2 LCDI-EA-002 NETGEAR G54 Wireless Router Model # WGR614v10 Page 4 of 10 Patrick Leahy Center for Digital Investigation (LCDI) Our first action was to download and install Router Marshal on Research-5, which is Host Computer 1 (2.1.1). In order for Router Marshal to function properly, according to the manual, we also had to download and install Nmap (http://nmap.org/) and WinPcap, which comes with the Nmap download. We connected LCDI PC 1, with Router Marshal installed, and Test Computer 1 to Router 1. Router 1 is connected to the Student network. Our first attempt at
Recommended publications
  • Tomato Topology Management Tool
    ToMaTo Topology Management Tool Dennis Schwerdel University of Kaiserslautern, Germany Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Introduction ToMaTo is a topology-oriented control framework for virtual networking experiments. Control framework Topology-oriented Like Planet-Lab, Emulab, ... Basic abstraction: Network Developed in the German-Lab topology project Each experiment has its own Open-Source project (hosted on topology Github) Topologies contain connected elements Virtual networking experiments Developed for networking Advanced features experiments Direct console access E.g. networking research or Link emulation software testing Packet capturing All parts of the experiment setup are virtual Dennis Schwerdel, University of Kaiserslautern, Germany 2 Topology Graphical representation Icons show element type Colored icons show virtualization technology Link color shows network segments Link style shows link attributes Example One central server 4 clients, connected with 2 switches Internet connected to server Per Topology Accounting Permissions Dennis Schwerdel, University of Kaiserslautern, Germany 3 VM Elements KVM Full virtualization Integrated into Linux Kernel OpenVZ Container virtualization Added to Linux Kernel via patch Scripts Programming language virtualization Installed as software Additional elements Easy to add more Planned: VirtualBox, LXC Dennis Schwerdel, University of Kaiserslautern, Germany 4 Repy scripts Repy Restricted Python (Sandbox) Technology from Seattle testbed Modified for ToMaTo Functions for receiving and sending raw ethernet packages packet = tuntap_read("eth0", timeout=None) ethernet = ethernet_decode(packet) echo("%s -> %s: %d bytes\n" % (ethernet.src, ethernet.dst, len(packet)) tuntap_send("eth1", packet) Library Basic protocols implemented: Ethernet, IPv4, TCP, UDP and ICMP Even some higher protocols: DHCP and DNS Examples for: NAT router, DHCP server, DNS server, Switch, ..
    [Show full text]
  • Block Icmp Ping Requests
    Block Icmp Ping Requests Lenard often unpenned stutteringly when pedigreed Barton calques wittingly and forsook her stowage. Garcia is theropod vermiculatedand congregate unprosperously. winningly while nonnegotiable Timothy kedges and sever. Gyrate Fazeel sometimes hasting any magnetron Now we generally adds an email address of icmp block ping requests That after a domain name, feel free scans on or not sent by allowing through to append this friendship request. Might be incremented on your Echo press and the ICMP Echo reply messages are commonly as! Note that ping mechanism blocks ping icmp block not enforced for os. This case you provide personal information on. Send to subvert host directly, without using routing tables. Examples may be blocked these. Existence and capabilities is switched on or disparity the protocol IP protocol suite, but tcp is beat of. We are no latency and that address or another icmp message type of icmp ping so via those command in this information and get you? Before assigning it is almost indistinguishable from. Microsoft Windows found themselves unable to download security updates from Microsoft; Windows Update would boost and eventually time out. Important mechanisms are early when the ICMP protocol is restricted. Cisco device should be valuable so a host that block icmp? Add a normal packet will update would need access and others from. Now check if you? As an organization, you could weigh the risks of allowing this traffic against the risks of denying this traffic and causing potential users troubleshooting difficulties. Icmp block icmp packets. Please select create new know how long it disables a tcp syn flood option available in specific types through stateful firewalls can have old kernels.
    [Show full text]
  • U.S. Government Printing Office Style Manual, 2008
    U.S. Government Printing Offi ce Style Manual An official guide to the form and style of Federal Government printing 2008 PPreliminary-CD.inddreliminary-CD.indd i 33/4/09/4/09 110:18:040:18:04 AAMM Production and Distribution Notes Th is publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. Th e GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To fi nd a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. Th e electronic text of this publication is available for public use free of charge at http://www.gpoaccess.gov/stylemanual/index.html. Use of ISBN Prefi x Th is is the offi cial U.S. Government edition of this publication and is herein identifi ed to certify its authenticity. ISBN 978–0–16–081813–4 is for U.S. Government Printing Offi ce offi cial editions only. Th e Superintendent of Documents of the U.S. Government Printing Offi ce requests that any re- printed edition be labeled clearly as a copy of the authentic work, and that a new ISBN be assigned. For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 ISBN 978-0-16-081813-4 (CD) II PPreliminary-CD.inddreliminary-CD.indd iiii 33/4/09/4/09 110:18:050:18:05 AAMM THE UNITED STATES GOVERNMENT PRINTING OFFICE STYLE MANUAL IS PUBLISHED UNDER THE DIRECTION AND AUTHORITY OF THE PUBLIC PRINTER OF THE UNITED STATES Robert C.
    [Show full text]
  • Wireless Networking in the Developing World
    Wireless Networking in the Developing World Second Edition A practical guide to planning and building low-cost telecommunications infrastructure Wireless Networking in the Developing World For more information about this project, visit us online at http://wndw.net/ First edition, January 2006 Second edition, December 2007 Many designations used by manufacturers and vendors to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the authors were aware of a trademark claim, the designations have been printed in all caps or initial caps. All other trademarks are property of their respective owners. The authors and publisher have taken due care in preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information contained herein. © 2007 Hacker Friendly LLC, http://hackerfriendly.com/ This work is released under the Creative Commons Attribution-ShareAlike 3.0 license. For more details regarding your rights to use and redistribute this work, see http://creativecommons.org/licenses/by-sa/3.0/ Contents Where to Begin 1 Purpose of this book........................................................................................................................... 2 Fitting wireless into your existing network.......................................................................................... 3 Wireless
    [Show full text]
  • IMPLEMENTATION, EVALUATION, and APPLICATIONS of MOBILE MESH NETWORKS for PLATFORMS in MOTION Jared
    ABSTRACT Title of Document: IMPLEMENTATION, EVALUATION, AND APPLICATIONS OF MOBILE MESH NETWORKS FOR PLATFORMS IN MOTION Jared Stanislaus Napora Master of Science, 2009 Directed By: Professor Christopher C. Davis Department of Electrical and Computer Engineering This thesis explores the selection, implementation, and evaluation of two mobile mesh networks, each involving a different distributed computing problem. In the forthcoming discussion, it will become apparent how system constraints affect the optimal choice of mesh networking design and implementation in these cases. The first problem explores the design and implementation of a distributed computing mesh network that will allow a collection of autonomous land vehicles to gather, process, and exchange information in an unknown environment. This network was established by adapting standard commercial 802.11 routers and by providing a software framework that handles all communication between wireless nodes. The second problem involves the design of a network for tracking and monitoring personnel. This network was implemented utilizing ZigBee modules due to power and custom implementation constraints. Both networks were tested with respect to their specific design constraints and they lay the foundation for additional application development and research. IMPLEMENTATION, EVALUATION, AND APPLICATIONS OF MOBILE MESH NETWORKS FOR PLATFORMS IN MOTION By Jared Stanislaus Napora Thesis submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of Master of Science 2009 Advisory Committee: Professor Christopher C. Davis, Chair Professor Gilmer L. Blankenship Professor Victor L. Granatstein © Copyright by Jared Stanislaus Napora 2009 Dedication To my parents and brother, for their continued support and encouragement.
    [Show full text]
  • Please Do Not Reply to This Email. Public Comments on Equipment
    Please Do Not Reply To This Email. Public Comments on Equipment Authorization and Electronic Labeling for Wireless Devices:======== Title: Equipment Authorization and Electronic Labeling for Wireless Devices FR Document Number: 2015-18402 RIN: Publish Date: 8/6/2015 12:00:00 AM Submitter Info: First Name: Yunseok Last Name: Choi Mailing Address: 1760 Broadway St Apt 328 City: Ann Arbor Country: United States State or Province: MI ZIP/Postal Code: 48105 Email Address: Organization Name: Comment: Implementing rules that take away the ability of users to install the software of their choosing on their computing devices reduces innovation and security. Wifi drivers often have serious bugs that pose a security threat. By being able to modify the firmware, users are able to defend their network and data from malicious hackers and criminals. Americans should have the right to maintain their security. In addition, allowing modification allows researchers and other inventors to create new innovation that would make computing and wireless data transfer more secure, which would reduce the costs of damages that security issues cause. Not fixing security holes either feeds cyberthreats or increases electronic waste. Meanwhile,there is no evidence that open-source firmware has caused any more wireless interference than closed-source firmware. Please do not implement restrictions that hinder progress and security. Implementing rules that take away the ability of users to install the software of their choosing on their computing devices reduces innovation and security. Wifi drivers often have serious bugs that pose a security threat. By being able to modify the firmware, users are able to defend their network and data from malicious hackers and criminals.
    [Show full text]
  • Rangemax™ Wireless-N Gigabit Router With
    RangeMax™ Wireless-N ‡ Gigabit Router with USB N300 WNR3500L Data Sheet 2.4 GHz Gigabit Switching with Wireless-N for Faster Network Performance • Wireless-N technology for faster wireless speeds and range • Four Gigabit Ethernet ports deliver ultra-fast wired connections • ReadyShare™ provides fast and easy shared access to an external USB storage device • Push ‘N’ Connect securely connects devices at the touch of a button • Smart Wizard® installation CD and multi-language support make setup easy • Automatic Quality of Service (QoS) for reliable Internet, voice and gaming applications • Configurable as a wireless repeater for extending range • Push ‘N’ Connect and Wi-Fi Protected Setup™ (WPS) ensure a quick and secure network connection Open-Source Router, Community and Development Partner program • Open-source Wireless-N router with Gigabit wired ports for Linux developers and open-source enthusiasts. • Open-source community website and development Partner program with downloadable applications, user guide, forums, blogs and downloads at www.myopenrouter.com • High Performance Broadcom 480 MHz MIPS® 74K CPU, 8 MB Flash and 64 MB RAM to even run business-class applications • Popular Linux Firmware—DD-WRT, Open-WRT and Tomato available on Open-source community website • NEW Development Partner Program—development partnership with several 3rd party software vendors to develop custom applications on WNR3500L. Please visit www.myopenrouter.com to join the partner program and see the custom applications that are released or under development.
    [Show full text]
  • Tomato Firmware Wpn824
    Tomato firmware wpn824 click here to download I wanted to try some custom router software/firmware. from link 1B, OpenWRT's supported hardware page, which lists the WPN[v1 to v3]. www.doorway.rure and Latest OpenWrt Release - Currently work in progress to get it into Trunk and . Description of serial port on WPN ​Hardware Highlights · ​Installation · ​Specific configuration · ​Hardware. compiled from opensource - new firmware: new build for WPN from www.doorway.ru Source: Firmware WPNN opensource (Page 1) — Hardware. It is a modification of the famous Tomato firmware, with additional built-in support for USB port, wireless-N mode support, support for several. I take ticket www.doorway.ru#comment:1 for new compiled from opensource - new firmware: new build for WPN from. DD-WRT is a Linux-based firmware for several wireless routers, most notably Tomato Firmware is a free Linux-based firmware distribution for. Netgear WPN v2. However, finding a legitimate third party firmware seems to be more difficult than I originally thought. DD-WRT and OpenWRT don't seem to. Model / Version: WPN v2. Select a Firmware and Software Downloads. Current Versions. WPNv2 Firmware Version (North America only). BTW - I LOVE 'tomato' firmware - very easy to use and gives great graphs of All tomato has to do is provide a supported firmware I can fit on a. I picked up a bunch of refurbished wpn for $13 each, but I gave them away to use in a large house as access points. The stock firmware. Dont bother with downloading updated firmware for Router yet. There just isnt one and they probably wont fix this issue anyways given that this.
    [Show full text]
  • Sysadministrivia S0E10: "Jthan Tries to Edit"
    Sysadministrivia Linux, Lagers, and Late Nights S0E10: "Jthan Tries to Edit" Posted 2015-06-29 03:52 Modified 2018-07-06 17:23 Comments 0 Navigation Previous Episode Next Episode S0E9: "Two Dicks and Two Virgins" S0E11: "Proto-Router" Log Recorded (UTC) Aired (UTC) Editor 2015-06-18 03:11:53 2015-06-29 03:52:06 jonathan d. Verification Format SHA256 GPG Audio File MP3 295c43eaddf9ed8d39f48f5402b1b33cb8d6733032a3ce9108bfd008b5eb2e90 click click OGG 77df4b314b5f6242e5702d2a0356edc42f29b6ee383c7ca8ad5a55d520daf333 click click Quicklisten: The death of Mandriva, a social media botnet running on consumer routers, Solaris, alternative firmware for consumer routers, and some games that run on GNU/Linux (plus the fun goodness of two high-profile compromises). This is the first episode Jthan tried his hand at editing. I ended up fixing a fair bit. :P Notes Errata Music Notes So Mandriva is dead Because of staffing, Jthan. Not quality/type of product or going bankrupt. But there are three forks you can check out… Mageia is definitely the most popular, by far Jthan also mentions PCLinuxOS And he also mentions OpenMandriva You may want to read more about Mandriva (the company and the product). Jthan brings up Gitolite, which we’ll definitely cover in another episode. And the documentation he references is here And I mentioned WinAmp Information on Moose, the “router worm”, can be found here and here You may also want to keep tabs on RouterSecurity’s bug list The list of companies’ products affected are: Actiontec, Hik Vision, Netgear, Synology, TP-Link, ZyXEL, and Zhone Thankfully, Solaris/OpenSolaris is dead (and has been for a while) At least they gave us ZFS I mention Illumos, the maintained fork of (Open?)Solaris.
    [Show full text]
  • Laboratorio 5 “Soluciones Libres”
    Laboratorio 5 “Soluciones Libres” 3.1 3.1.1 Describa las características principales de OpenWRT R. OpenWrt es una distribución de Linux basada en firmware usada para dispositivos empotrados tales como routers personales. El soporte originalmente fue limitado al modelo Linksys WRT54G, pero desde su rápida expansión se ha incluido soporte para otros fabricantes y dispositivos, incluidos el Netgear, D- Link, ASUS y algunos otros. El router más popular sigue siendo el Linksys WRT54G y el ASUS WL500G. OpenWrt utiliza principalmente una interfaz de línea de comando, pero también dispone de una interfaz WEB en constante mejora. El soporte técnico es provisto como en la mayoría de los proyectos de Software Libre, a través de foros y su canal IRC. 3.1.2 Describa los procedimientos para flashear un router con OpenWRT R. Conectamos el PC al router mediante un cable a cualquiera de los puertos LAN del router. El router nos servirá una IP por DHCP. Los dispositivos TP-LINK utilizan la subred 192.168.0.0/24, la IP del router será la192.168.0.1, y la que nos asigne a nuestro PC será cualquier IP dentro de ese rango. Ya podemos acceder al panel de administración, vía web, a través de esta dirección: http://192.168.0.1, con el usuario admin, contraseña admin. Accedemos ahora al menú System tools, subapartado Firmware Upgrade. Del selector de archivos subimos el firmware de OpenWRT que hemos descargado antes, y apretamos el boton deUpgrade Firmware. Tardará unos 5 minutos en completar el proceso. Ya tenemos OpenWRT en nuestro router.
    [Show full text]
  • July 2015 Slides .Pdf Format
    Fix your F***ing Router Already Aaron Grothe NEbraskaCERT Disclaimer Replacing your firmware on your router is a process that for a lot of routers will invalidate your warranty and in a worst case scenario give you a very poor night light. Disclaimer (Cont’d) After not having bricked a router in 6+ years I managed to brick one Sunday night getting ready for this talk. I was stupid and did something stupid the router is still broken though :-( Quick Survey How many of you are running the firmware that came with your router? How many of you have patched your router since you plugged it in? How many of you keep looking for the update that never comes? Why upgrade/new Firmware? Four quick examples from a quick DuckDuckGo Search Links for Pictures Its Even Worse That is just the vendors who are willing to issue security fixes and acknowledge issues. If you get some of the off brand routers or your router is older you might not ever get a notice or an update Not Just For Security You get a lot of new features/capabilities with new firmware as well We’ll go into them later in the talk What are some of my Options? There are a couple of options we’re going to discuss: DD-WRT - http://www.dd-wrt.com OpenWRT - http://openwrt.org Tomato - http://www.polarcloud.com/tomato What are some more of my Options? These are a couple of other ones to consider LibreCMC - http://www.librecmc.org OpenWireless - http://www.openwireless.org DD-WRT - My Personal Choice DD-WRT supports a lot of hardware for a look at the router database hit https://www.dd-wrt.com/site/support/router- database It has more features than OpenWRT - NAS, etc OpenWRT OpenWRT is a smaller release, therefore possibly more secure.
    [Show full text]
  • Features Security Lessons: Linux WAP
    FEATURES Security Lessons: Linux WAP Wireless security and Linux Access Point If you are looking for a cheap and secure wireless router setup, check out Tomato, DD-WRT, or OpenWrt. By Kurt Seifried actually remember when I bought WPA2 with a good password (again support? You have three main options: my first wireless network card. I was none force this), and that’s it. You can buy a high-end wireless router in Vancouver airport, and they were To make matters worse, most of these designed to allow for a more full-fea- Iselling them for about US$ 200 with wireless routers are running pretty mini- tured system (e.g., Mikrotik or Soekris); unlimited usage in the air- you can add a wireless card to port (as opposed to having an existing Linux box and set to rent one for US$ 20 an "Open source firmware it up as a wireless router; or hour). At that time, I was you can buy a cheap wireless spending a lot of time in this blows the vendor firm- router that is supported by airport, so I purchased a card OpenWrt, DD-WRT, or To- and had a whopping 2Mbps ware out of the water." mato. (802.11a) of bandwidth to The first option is pretty use while waiting. This purchase was mal operating systems (sometimes re- simple: You just go spend US$ 100-400 quickly followed by a wireless router so I ferred to as firmware) that have just (you buy the system, wireless card(s), could enjoy the wireless goodness at enough capability to get you online home.
    [Show full text]