wja0 / IoT-Botnet-Attack-Detection-Module

Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
13 stars 3 forks source link

t #3

Open Kim-Gang-Min opened 2 years ago

Kim-Gang-Min commented 2 years ago

Download: http://www.infradead.org/~tgr/libnl/

-------------------------------do this ----------------------------- mkdir libnl_install // 创建安装路径 CFLAGS="-muclibc -O2" CPPFLAGS="-muclibc -O2" LDFLAGS="-muclibc -O2" ./configure --host=mips-linux-gnu --prefix=/usr/local/wpa_supplicant/libnl-1.1.4/libnl_install make make install tar zxvf hostapd-2.0.tar.gz cp defconfig .config CC=mips-linux-gnu-gcc -L/usr/local/wpa_supplicant/openssl-0.9.8za/openssl_install/lib CFLAGS+=-I/usr/local/wpa_supplicant/openssl-0.9.8za/openssl_install/include LIBS+=-L/usr/local/wpa_supplicant/openssl-0.9.8za/openssl_install/lib CFLAGS+=-I/usr/local/wpa_supplicant/libnl-1.1.4/libnl_install/include LIBS+=-L/usr/local/wpa_supplicant/libnl-1.1.4/libnl_install/lib CFLAGS += -muclibc LDFLAGS += -muclibc -lpthread -lm /var/lib/misc/ /etc/hostapd.conf /etc/udhcpd.conf mkdir -p /var/lib/misc touch /var/lib/misc/udhcpd.leases ifconfig wlan0 down

echo "/lib/firmware/fw_bcm40181a2_apsta.bin">/sys/module/bcmdhd/parameters/firmware_path

ifconfig wlan0 192.168.1.10 up hostapd -B etc/hostapd.conf udhcpd /etc/udhcpd.conf
Configuration file: /etc/hostapd.conf rfkill: Cannot open RFKILL control device Using interface wlan0 with hwaddr 40:9f:38:84:b3:8b and ssid "TEST_Wifi" random: Only 19/20 bytes of strong random data available from /dev/random random: Not enough entropy pool available for secure operations WPA: Not enough entropy in random pool for secure operations - update keys later when the first station connects interface=wlan0 ctrl_interface=/var/run/hostapd ctrl_interface_group=0 ssid=TEST_Wifi hw_mode=g channel=1 beacon_int=100 driver=nl80211 macaddr_acl=0

deny_mac_file=/etc/hostapd.deny

accept_mac_file=/etc/hostapd.accept

auth_algs=1 ignore_broadcast_ssid=0 own_ip_addr=127.0.0.1 wpa=2 wpa_passphrase=12345678 rsn_pairwise=TKIP CCMP