My Ex-WiFi uses packet sniffing to construct a portrait of the individuals in an area. This was made for Paolo Pedercini’s Internet Resistance class at CMU.

 

DESCRIPTION

Upon discovery by the program, the old WiFi networks are broadcasted–allowing any device within the vicinity to see the network names on its WiFi list. The result is a graveyard of bygone WiFi networks; “ghosts” of access points that reveal so much yet so little about people’s lives, which can only be seen but never joined. 

 

'mukkuru', 'Apple Store', 'TroyBoy', and 'IBMVISITOR' are the fake networks

 

In this project I learned that our devices retain more information about us than we are aware of.  On the day of my presentation, a local artist who was visiting my class was surprised to find the Wifi network of a coffee shop in Europe she frequently visited with her ex-girlfriend.  I was surprised to discover that my professor used to have a network named 'cuddledeath'.

 

TECHNICAL DETAILS

This project makes use of the packet sniffing and beacon injection functionalities available in the aircrack-ng suite. There are three separate bash scripts: start.sh, main.sh, and inject.sh.

  Sample output from network monitoring

Sample output from network monitoring

main.sh runs the start.sh and inject.sh scripts.

start.sh initiates network monitoring and saves the output (above) into a .csv file. This file is continually updated as stations enter and leave the network.

inject.sh parses this csv file, paying attention to only the entries in the “Probes” column as those entries represent networks previously joined by the device. After extracting the names of the entries, the script turns them into fake Access Points by injecting them into the network–this is done by spoofing MAC Addresses for each entry. To avoid redundancies, an entry is only added if it does not already exist in the Wifi network list.