A Louisiana nursing home owner is facing a new lawsuit over evacuating residents to a squalid warehouse to ride out Hurricane Ida in 2021.
Saints GM Loomis seeks stability, and value for Payton
New Orleans Saints general manager Mickey Loomis says he values stability and that influenced the club’s decision to retain coach Dennis Allen after finishing this season at 7-10 and outside the playoff picture.
Japan PM tells Biden that new era requires more military muscle
US President Joe Biden and Japanese Prime Minister Fumio Kishida discuss increased Japanese defense spending in the Oval OfficeWashington (AFP) – Japanese Prime Minister Fumio Kishida pledged Friday alongside US President Joe Biden to modernize his co…
Pills bought through Snapchat caused deaths of 8 teens and young adults from West and Midwest, lawsuit says
“Snapchat knows that its platforms are being used by drug dealers … and they turn a blind eye,” says an official for the nonprofit bringing the lawsuit.
How major US stock indexes fared Friday 1/13/2023
Stocks closed higher on Wall Street as earnings reporting season got underway and CEOs began to show how well or poorly they’re navigating high inflation and a slowing economy.
Frene Ginwala: First democratic S African parliament speaker dies
Frene Noshir Ginwala, called the ‘torchbearer’ of the post-apartheid parliament, dies aged 90 after suffering a stroke.
MRs creep up while rest of product tanker market struggles
Two MR routes proved bright spots while LR routes across the globe saw declines
Reverse engineering proprietary device that uses WPA
Hi
I have a device which is controlled from a smart phone application via a password-free WPA connection.
I’d like to intercept the traffic between my smart phone and the device and see if I can write an API to control the device without the developers application
The device sets up a WPA wireless network without a password and hands out a single IP – any additional connections do not receive an IP.
I was able to connect a laptop to the device and nmap it. it only has tcp/50007 open
I was considering setting up a MITM device which uses one NIC to connect to the device and another to mock the WPA connection. I should then be able to Wireshark or tcpdump the traffic to/from the device
Before I embark on building a raspberry pi with the wifi devices – is there a better way? Is there a reliable way to intercept the password-less WPA traffic directly between the application and device?
Maybe a cheap rooted android device running the app would be easiest?
submitted by /u/soberto
[link] [comments]