[MISC] Activate and Adjust Wifi HotSpot Settings, No Root Necessary - G2 and Desire Z General

Interestingly enough if you install Launcher Pro or similar you can pop right on over to the Froyo AP settings.
Its very straight-forward, all you need to do is long press your homescreen, create a shortcut/activity that goes directly to the Wifi AP settings, what you are looking for is:
com.android.settings.wifi.WifiApSettings
Its as exactly as you would find on the Nexus One, its just hidden from the standard menus to keep the noobs out I suppose. Hopefully they leave this in, since the cat is out of the bag!
Edit:
HamNCheese has figured out that the temp root is necessary to kick things off. Its not really complex, here is his instructions:
HamNCheese said:
Here's a workaround to get things working (for now)
Step 1: get root
Step 2: Add the wifi settings shortcut as posted in this thread and configure your AP
Step 3: Create dnsmasq.conf:
Code:
no-resolv
no-poll
server=208.67.222.222
server=208.67.220.220
dhcp-authoritative
Step 4: adb push dnsmasq.conf to /data/local/tmp
Step 5: create wifi.sh:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
./busybox ifconfig wl0.1 192.168.1.1
dnsmasq --strict-order --bind-interfaces --pid-file=/data/local/tmp/dnsmasq.pid --conf-file=/data/local/tmp/dnsmasq.conf --listen-address 192.168.1.1 --dhcp-range 192.168.1.2,192.168.1.254 --dhcp-lease-max=253
iptables -t nat --append POSTROUTING --out-interface rmnet0 -j MASQUERADE
iptables --append FORWARD --in-interface wl0.1 -j ACCEPT
Step 6: adb push wifi.sh to /data/local/tmp
Step 7: su, change to /data/local/tmp and run wifi.sh
Step 8: (important) Connect to your AP only after dnsmasq is started, otherwise you will get weird DNS failures.
Credit to teferi for his original USB tether script.
Click to expand...
Click to collapse

Ha! Nice find...

You beat me to it! I was just noticing that switchpro has an option to enable hotspot access. I still couldn't get to it, but the ssid popped up on my laptop.
This feature would make waiting for root soooo much easier. lol
Stupid dhcp...

Holy crap dude there it is! That's awesome. Thanks a lot for finding that out. Hopefully it does stay in.

Were you actually able to connect. My devices keep waiting to obtain an ip address
Sent from my T-Mobile G2 using XDA App

Rather than install an entirely new launcher, you could probably access this by installing AnyCut and creating a shortcut from there. Good luck to all you folks in G2 land!
Sent from my Nexus One using XDA App

yeah, its not working. good find still though.

I can get to it, but it's not working for me. Gets enabled, shows up on my laptop, but I never get an IP to use.

sherifone said:
Interestingly enough if you install Launcher Pro or similar you can pop right on over to the Froyo AP settings.
Its very straight-forward, all you need to do is long press your homescreen, create a shortcut/activity that goes directly to the Wifi AP settings, what you are looking for is:
com.android.settings.wifi.WifiApSettings
Its as exactly as you would find on the Nexus One, its just hidden from the standard menus to keep the noobs out I suppose. Hopefully they leave this in, since the cat is out of the bag!
Click to expand...
Click to collapse
I can't get anything to connect with it though so that's kind of a bust. Nice work on the hunt though!
Sent from my HTC Vision

To all of you trying to make it work, it doesn't. Something is disabled in the IP tables or something to that effect. The hotspot menu was removed from the settings.apk from the g2 shipped rom as another way to try and disable hotspot access. Looks like we're getting close!

I'm unable to get it up and running either. I see the SSID, but no valid connection.
Hopefully there's a simple workaround

InGeNeTiCs said:
Something is disabled in the IP tables or something to that effect.
Click to expand...
Click to collapse
Actually, everything is present - modules, iptables, etc. People are using the other wifi tether package successfully.

I think I found a solution.
We need to have an application to direct 3G data through post-added firewall and DHCP server, and direct to "hidden" hotspot.
When the application starts, it'll enable hotspot, and it'll get data from the network like other internet-based application, and direct to firewall/DHCP, and finally goes to the hotspot.
It's much like easytether or PDAnet, but the destination is hotspot instead of USB.
In addition, this application should have more options than native mobile hotspot like SSID hiding, site filtering, MAC address filtering.

Which wifi tether package is currently working?
Sent from my T-Mobile G2 using XDA App

YOUR CAN TETHER YOUR PHONE TO YOUR PC WITH "EASY TETHER"
Edit: IT WORKS You can Tether your phone using it
Has Anyone Tried "Easy Tether"

Here's a workaround to get things working (for now)
Step 1: get root
Step 2: Add the wifi settings shortcut as posted in this thread and configure your AP
Step 3: Create dnsmasq.conf:
Code:
no-resolv
no-poll
server=208.67.222.222
server=208.67.220.220
dhcp-authoritative
Step 4: adb push dnsmasq.conf to /data/local/tmp
Step 5: create wifi.sh:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
./busybox ifconfig wl0.1 192.168.1.1
dnsmasq --strict-order --bind-interfaces --pid-file=/data/local/tmp/dnsmasq.pid --conf-file=/data/local/tmp/dnsmasq.conf --listen-address 192.168.1.1 --dhcp-range 192.168.1.2,192.168.1.254 --dhcp-lease-max=253
iptables -t nat --append POSTROUTING --out-interface rmnet0 -j MASQUERADE
iptables --append FORWARD --in-interface wl0.1 -j ACCEPT
Step 6: adb push wifi.sh to /data/local/tmp
Step 7: su, change to /data/local/tmp and run wifi.sh
Step 8: (important) Connect to your AP only after dnsmasq is started, otherwise you will get weird DNS failures.
Credit to teferi for his original USB tether script.

Can't wait for this feature to be ready.
Sent from my T-Mobile G2 using XDA App

RaffieKol said:
YOUR CAN TETHER YOUR PHONE TO YOUR PC WITH "EASY TETHER"
Edit: IT WORKS You can Tether your phone using it
Has Anyone Tried "Easy Tether"
Click to expand...
Click to collapse
Can easytether do it over wifi????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

Gotta wait till next month to get this phone. But.
Why can't you give yourself a static IP in the same subnet as the phone and use the phone as your DNS server? Or is it not routing either?

Anomaly said:
Gotta wait till next month to get this phone. But.
Why can't you give yourself a static IP in the same subnet as the phone and use the phone as your DNS server? Or is it not routing either?
Click to expand...
Click to collapse
Haven't tried that, but there might be an issue with trying to steal an IP from the T-Mobile dhcp pool.

Related

[Q] Connecting to Market place via Ethernet doesn't work and more...

Thanks to Thor2002ro's kernel, I am able to connect to the internet via ethernet (purchased a USB to network adapter from amazon chipset AX88772A). However,
I am not able to do the following:
1) Download apps from the Market app. The page hangs while the app tries to installs forever.
2) Connect to Pandora
3) Connect to GTalk
4) When I connect using the stock browser, I get the "No Network Connection" popup but the webpage successfully loads in the background. Same for problem occurs when using the Dolphin HD browserl. (No trouble with Firefox and Opera).
5) Cannot download files (ie PDFs, XLS, DOC) using the stock browser. The task bar says downloading...but it never finishes.
I've read that ethernet is a non-standard means of connecting to the net. As a result the ethernet interface does not get registered with the ConnectivityManager. Many built-in apps will query the ConnectivityManager to see if the network connection is active. If not, it won't proceed with the related activity. (ie downloading).
Does anyone have the same problem? Does anyone have any solution? Thanks in advance.
[EDIT]: It appears that someone has done the work of including the ethernet classes in Eclair, but somehow the code never made it to HC. Please see the link http://git.android-x86.org/?p=platform/frameworks/base.git;a=commit;h=73c8442658704e5749c5fc6fd6f93c15fcf1d7c6
If possible, can one of the brilliant devs incorporate this feature into a new rom? Thanks again!
not possible... HC has no source...
alternative buy a mobile hotspot... for stuff like this I use a Fon2200 + battery pack
Solved using a trick
I figured a way to trick the apps that require connectivity via wireless.
Simply write a script that executes at boot time. The script will set the wireless interface to a fake IP address.
#!/system/bin/sh
netcfg wlan0 down
netcfg wlan0 up
busybox ifconfig wlan0 169.254.1.50 netmask 255.255.255.0 broadcast 169.254.2.255
netcfg eth0 up
dhcpcd eth0
setprop net.dns1 8.8.8.8
setprop net.dns2 8.8.4.4
All the apps now work including market place, pandora, gtalk, downloading normal files from the web. The stock browser doesn't complain anymore!
but doesn't this keep the wifi awake?
do a lsmod....
Thread Closed.
Q&A subforum is the place for Q

Reverse tethering via android hot-spot

Hi Guys,
This is a VERY easy and VERY secure trick to reverse tether which does not require any special app except rooting and terminal emulator.
I have done this on Linux but should work on windows as well.
1) Setup ur android as wifi hotspot (do NOT enable data connection though)
2) Make sure internet on ur laptop is working and shareable
3) Connect ur laptop to android hotspot
4) Note down the IP that laptop got (mostly 192.168.43.XXX)
5) Open terminal emulator and go to su (superuser) shell
6) Add default gateway route in android by running:
ip r del default; ip r add default via IP_FROM_STEP_4_ABOVE
Bingo! now u have reverse tethered. i.e. u should be able to access internet on android which actually uses internet connection of laptop.
Added BONUS, this all without ad-hoc network and still uses WPA2 security and the connection is very secure.
No tunneling, no additional softwares to install, NOTHING.
Additional TIPS:
1) Disable DHCP on laptop and assign FIX IP (say 192.168.43.2) for connecting to hotspot. Do NOT give any gateway or DNS.
2) Create a file in sdcard say /sdcard/reversegw.sh and add these lines:
ip r del default
ip r add default via 192.168.43.2
setprop net.rmnet0.dns1 208.67.222.222
setprop net.rmnet0.dns2 208.67.220.220
setprop net.dns1 208.67.222.222
setprop net.dns1 208.67.220.220
#NOTE: setprop lines set DNS of android to OpenDNS
3) In terminal emulator preferences, set "Initial command" as:
su -c 'sh /sdcard/reversegw.sh'
Bingo two! everything is now almost automatic.
Next time you want reverse tethering
1) Enable Hotspot on android
2) Connect laptop to that hotspot
3) start terminal emulator (which will automatically run that script)
4) You may now close terminal emulator
Few WORKAROUNDS
1) Android market works with this reverse tethering trick BUT it does not "download/update" apps. This is because market app thinks there is no internet connection.
2) Simple trick is that u also enable ur data connection after following all above steps
Market will now think that internet connection is there but it will continue to download via reverse tethered connection. Just make sure that data connection icon on status bar is not showing any activity. i.e. up/down arrows shud not glow
So... How is this different from internet connection sharing from your PC?
For that you need access point or wireless router.
This is without need for wireless router/access point or without USB cable.
Hi,
Thanks a lot for this clever trick, I was p***ed off that I could easily connect my windows XP to my phone's wifi hotspot but not the other way around, searched for days before finding your post.
Just a quick tip for future readers : as you mentioned, to be able to download from Google Play, you need to activate packet data, however it seems to me that you need to activate it BEFORE enabling your wifi access point, connecting your PC to it and launching the routing script. Enabling packet data after your wifi network is established seems to break eveything.
Before or after.. may be its mobile dependent, I dont know.
In my case it works afterwards. Havent tried what happens if mobile data is enabled before the steps.
Whatever works, just make sure that its not using mobile network for internet else one might end up paying high charges.
If I connect the computer to the android hotspot it disconnects from the router, so I don't have internet anymore neither in the phone nor in the computer. How is it supposed to work? Can you post a schematic of the network and which device is connected to the outside internet?
i got reply in the terminal RTNETLINK answers : No such process.
asking for inet address
amishxda said:
Hi Guys,
This is a VERY easy and VERY secure trick to reverse tether which does not require any special app except rooting and terminal emulator.
I have done this on Linux but should work on windows as well.
1) Setup ur android as wifi hotspot (do NOT enable data connection though)
2) Make sure internet on ur laptop is working and shareable
3) Connect ur laptop to android hotspot
4) Note down the IP that laptop got (mostly 192.168.43.XXX)
5) Open terminal emulator and go to su (superuser) shell
6) Add default gateway route in android by running:
ip r del default; ip r add default via IP_FROM_STEP_4_ABOVE
Bingo! now u have reverse tethered. i.e. u should be able to access internet on android which actually uses internet connection of laptop.
Added BONUS, this all without ad-hoc network and still uses WPA2 security and the connection is very secure.
No tunneling, no additional softwares to install, NOTHING.
Additional TIPS:
1) Disable DHCP on laptop and assign FIX IP (say 192.168.43.2) for connecting to hotspot. Do NOT give any gateway or DNS.
2) Create a file in sdcard say /sdcard/reversegw.sh and add these lines:
ip r del default
ip r add default via 192.168.43.2
setprop net.rmnet0.dns1 208.67.222.222
setprop net.rmnet0.dns2 208.67.220.220
setprop net.dns1 208.67.222.222
setprop net.dns1 208.67.220.220
#NOTE: setprop lines set DNS of android to OpenDNS
3) In terminal emulator preferences, set "Initial command" as:
su -c 'sh /sdcard/reversegw.sh'
Bingo two! everything is now almost automatic.
Next time you want reverse tethering
1) Enable Hotspot on android
2) Connect laptop to that hotspot
3) start terminal emulator (which will automatically run that script)
4) You may now close terminal emulator
Few WORKAROUNDS
1) Android market works with this reverse tethering trick BUT it does not "download/update" apps. This is because market app thinks there is no internet connection.
2) Simple trick is that u also enable ur data connection after following all above steps
Market will now think that internet connection is there but it will continue to download via reverse tethered connection. Just make sure that data connection icon on status bar is not showing any activity. i.e. up/down arrows shud not glow
Click to expand...
Click to collapse
when i did as you said it is asking for the inet address am using tab 2 p3100 plz help me thanks in advance:good:
bkrishna963 said:
when i did as you said it is asking for the inet address am using tab 2 p3100 plz help me thanks in advance:good:
Click to expand...
Click to collapse
Post screenshot.
Screen shot
amishxda said:
Post screenshot.
Click to expand...
Click to collapse
Sorry for late
bkrishna963 said:
Sorry for late
Click to expand...
Click to collapse
IP is wrong just give IP address.
Also check original post properly. You have done 2 mistakes.
ip r del default; ip r add default via 192.168.43.2
Also next time please post bigger screenshot!
Am facing problem as shown in the pics when it is connected to lap it is showing as limited access and i cant proceed plz help me
Sent from my GT-P3100 using XDA Free mobile app
bkrishna963 said:
Am facing problem as shown in the pics when it is connected to lap it is showing as limited access and i cant proceed plz help me
Click to expand...
Click to collapse
Limited connectivity is inside PC. Please check your internet connection. Do not set android phone as your gateway for PC. (Read additional TIPS in my first post)
Thanks

[GUIDE] How to WiFi tether with VPN (DroidVPN)

Before anyone says "this has been discussed before" yes it has, but this is the ONLY method that's worked for me, so therefore it may also work for you when others have not.
My carrier is Telcel (Mexico) Its prepaid that I haven't paid for since using the VPN, as it allows me to have free internet, and this method allows me to share it with all my devices, I've used 30GB of data in 2 weeks.
Disclaimer: not responsible for your device in anyway, even though this should not harm anything
STEP 1: You need a rooted device
STEP 2: Make sure you have a VPN app, like OpenVPN or DroidVPN ( I use DroidVPN and its the best)
STEP 3: Download Terminal Emulator
STEP 4: Activate your hotspot and connect to your VPN
STEP 5: launch Terminal emulator and on the first line type "su" (without the quotes) and press enter
STEP 6: Copy and paste this to the Terminal Emulator, MAKE SURE TO PASTE TO A NEW FOLDER USING ROOT BROWSER FIRST, AND COPY TO T.E. IN THE EXACT FORMAT AS SHOWN
Code:
iptables -t filter -F FORWARD
iptables -t nat -F POSTROUTING
iptables -t filter -I FORWARD -j ACCEPT
iptables -t nat -I POSTROUTING -j MASQUERADE
ip rule add from 192.168.43.0/24 lookup 61
ip route add default dev tun0 scope link table 61
ip route add 192.168.43.0/24 dev wlan0 scope link table 61
ip route add broadcast 255.255.255.255 dev wlan0 scope link table 61
STEP 7: That's about it
Also be sure to make a folder with Root Browser and paste the code there, as this resets after re-boot.
Please comment if this worked for you, it worked on my LG G3 on android 4.4.2
FIRST!
So, basically, what do this does?
GabrielCool1 said:
So, basically, what do this does?
Click to expand...
Click to collapse
Basically for me it allows me to bypass my carriers tether restrictions, in example; you have tmobile, your plan has unlimited data but only 5GB of tethering, this will trick it into thinking all traffic is coming from your phone, giving you unlimited data to all your devices
SmokeyTech1 said:
Basically for me it allows me to bypass my carriers tether restrictions, in example; you have tmobile, your plan has unlimited data but only 5GB of tethering, this will trick it into thinking all traffic is coming from your phone, giving you unlimited data to all your devices
Click to expand...
Click to collapse
Venga, que no te entiendo lo del tethering, me lo puedes explicar en español? C:
GabrielCool1 said:
Venga, que no te entiendo lo del tethering, me lo puedes explicar en español? C:
Click to expand...
Click to collapse
Claro! Enviarme un mensaje directo y yo te dijo
FWIW this will be different on different carriers, different devices, and different VPN(Juno's pulse for example). Good info none the less :good:
Sent from my SM-G900P using XDA Free mobile app
miked63017 said:
FWIW this will be different on different carriers, different devices, and different VPN(Juno's pulse for example). Good info none the less :good:
Sent from my SM-G900P using XDA Free mobile app
Click to expand...
Click to collapse
This should darn near be universal, as this was code I found was just a copy and paste of the original, don't need to change anything, it should also work with all VPNs, can't confirm though, I've only used this on my AT&T LG G3, I will try on my HTC One
Also the "IP table" part of the code can be found in a few places, the special part of the code is "ip rule" and "ip route"
SmokeyTech1 said:
This should darn near be universal, as this was code I found was just a copy and paste of the original, don't need to change anything, it should also work with all VPNs, can't confirm though, I've only used this on my AT&T LG G3, I will try on my HTC One
Also the "IP table" part of the code can be found in a few places, the special part of the code is "ip rule" and "ip route"
Click to expand...
Click to collapse
The iptables should be, but the routing, rules, and lookup tables could vary. Also some carriers you would need extra iptables commands and route commands to work with their tethering data cap security measures.
Like I said its useful knowledge but in some cases may need a little extra massaging to fully work.
any good guides for setting up a vpn server on your own PC?
sowers17 said:
any good guides for setting up a vpn server on your own PC?
Click to expand...
Click to collapse
Are you on windows or Linux?
Honestly the easiest way would be to get a router that supports it out of the box, but if you don't have one its still pretty easily doable.
thingss said:
Good guide. Thanks.
Click to expand...
Click to collapse
Did this work for you? If so please state your device name and android version, I'm going to add to the OP a "confirmed working on"
SmokeyTech1 said:
Before anyone says "this has been discussed before" yes it has, but this is the ONLY method that's worked for me, so therefore it may also work for you when others have not.
My carrier is Telcel (Mexico) Its prepaid that I haven't paid for since using the VPN, as it allows me to have free internet, and this method allows me to share it with all my devices, I've used 30GB of data in 2 weeks.
Disclaimer: not responsible for your device in anyway, even though this should not harm anything
STEP 1: You need a rooted device
STEP 2: Make sure you have a VPN app, like OpenVPN or DroidVPN ( I use DroidVPN and its the best)
STEP 3: Download Terminal Emulator
STEP 4: Activate your hotspot and connect to your VPN
STEP 5: launch Terminal emulator and on the first line type "su" (without the quotes) and press enter
STEP 6: Copy and paste this to the Terminal Emulator, MAKE SURE TO PASTE TO A NEW FOLDER USING ROOT BROWSER FIRST, AND COPY TO T.E. IN THE EXACT FORMAT AS SHOWN
Code:
iptables -t filter -F FORWARD
iptables -t nat -F POSTROUTING
iptables -t filter -I FORWARD -j ACCEPT
iptables -t nat -I POSTROUTING -j MASQUERADE
ip rule add from 192.168.43.0/24 lookup 61
ip route add default dev tun0 scope link table 61
ip route add 192.168.43.0/24 dev wlan0 scope link table 61
ip route add broadcast 255.255.255.255 dev wlan0 scope link table 61
STEP 7: That's about it
Also be sure to make a folder with Root Browser and paste the code there, as this resets after re-boot.
Please comment if this worked for you, it worked on my LG G3 on android 4.4.2
Click to expand...
Click to collapse
Do you have a premium account or a free one on Droid VPN?
Sent from my GT-S7392 using xda app-developers app
Andro001 said:
Do you have a premium account or a free one on Droid VPN?
Sent from my GT-S7392 using xda app-developers app
Click to expand...
Click to collapse
Premium, the free account almost never connects, and you only get 100mb daily
SmokeyTech1 said:
Premium, the free account almost never connects, and you only get 100mb daily
Click to expand...
Click to collapse
I used droid vpn on my sim's internet connection after 100mb it disconnected so I just changed the mobile and with the same account I logged jn droid vpn and it got connected. How was it possible?
Sent from my GT-S7392 using xda app-developers app
Andro001 said:
I used droid vpn on my sim's internet connection after 100mb it disconnected so I just changed the mobile and with the same account I logged jn droid vpn and it got connected. How was it possible?
Sent from my GT-S7392 using xda app-developers app
Click to expand...
Click to collapse
I really don't know, maybe droidvpn monitors each devices data, like you can use 100mb on one 100mb on another,
does this work on android lollipop version 5.0? im not sure if its safe to write that down in the android terminal
shadowx141 said:
does this work on android lollipop version 5.0? im not sure if its safe to write that down in the android terminal
Click to expand...
Click to collapse
Works and great! on android 5.02
Is there any way to incorporate this into an AFWall+ profile, so that someone can just switch profile when leaving home and have this automatically setup?
miked63017 said:
Are you on windows or Linux?
Honestly the easiest way would be to get a router that supports it out of the box, but if you don't have one its still pretty easily doable.
Click to expand...
Click to collapse
I got a dlink 510L that says it will run my pantech 290, it work on computer with software, when i put it in router saying no internet.

MAC Address Spoofing

Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
*** This requires root ***
I have it working in Marshmallow 6.0.1 (not tried it in Nougat)
Only attempt this if you understand MAC Addresses and be sure to note down your original/official MAC Address. Open /persist/wlan_mac.bin and take a copy of the contents before attempting the below.
Some background reading if you're not familiar with MAC Addresses.
Code:
ifconfig wlan0
will tell you all you need to know about the current state of your wireless adapter
The first command generates a MAC Address. I've hardcoded the first 6 characters of mine and randomly generate the remaining 6. It should generate a perfectly valid address but please post if it doesn't (or you have a better bash line).
The second sed command is to replace the MAC Address in the persisted wlan file. It's this command that needs to run as root.
You should be able to run these in something like Termux (make sure you're running as root by running "su" first). I actually run them using Tasker as "Code/Run Shell" commands.
Finally you need to enable then disable Airplane Mode for the change to take affect.
Here are the commands:
Code:
MAC=C0EEFB$(od -txC -An -N3 /dev/random| tr -d ' ')
Code:
sed -i "/Intf0MacAddress=/c\Intf0MacAddress=${MAC}" /persist/wlan_mac.bin
Code:
settings put global airplane_mode_on 1; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state true
Code:
settings put global airplane_mode_on 0; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state false
Code:
ifconfig wlan0 | grep HWaddr
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
BTW, thanks for the share!
bealer said:
Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
Click to expand...
Click to collapse
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
I dont think that it will work since our devices are F2FS i saw this on reddit the other day.
using a custom mac address
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Thanks in advance.
m0d hipp¥ said:
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
Click to expand...
Click to collapse
Yeah definitely things to improve,automating storing the original being one of them. I'll maybe follow up with that.
I didn't want to mask the main two commands too much with others around them. There are a few (older) ways to do this but this was the only way I could get it to work. And it's not a complete app/solution, more teaching a man to fish sort of thing.
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
You can although
a) OP3T isn't listed as a supported device, I didn't try it
b) You can't automate it with that app very easily. Mine changes via Tasker state/events every day so I don't need to bother doing it myself.
gxyf106 said:
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Click to expand...
Click to collapse
Easiest way is just to change the first command and hardcode the MAC you want, ie
Code:
MAC=C0EEFB998877
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
gxyf106 said:
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
Click to expand...
Click to collapse
Ah oops, that's an error in me typing it out. The 2nd command should contain:
Code:
${MAC}
The brackets were causing it to try and evaluate MAC as a command (rather than a variable). I'll update the OP.
I can confirm this works. many thanks!!
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Michalko5896 said:
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Click to expand...
Click to collapse
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
bealer said:
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
Click to expand...
Click to collapse
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Michalko5896 said:
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Click to expand...
Click to collapse
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
bealer said:
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
Click to expand...
Click to collapse
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
It stops wifi services tracking my phone. For example I use the wifi on the London Underground. Every time I connect to their wifi they'd know exactly where, when, how long, possibly my DNS requests just based on my MAC. It's all information that can be used for profiling or sold on (if that was part of the terms). They still may not known who I am exactly, but I'd rather they weren't able to identify/target me if it meant simply randomising my MAC. As mentioned Android already does this when scanning for networks.
Device Id isn't given, unless you mean hostname (which can be randomised too). If you're using HTTPS based websites then all browser traffic is encrypted via SSL. If you're not, then yeah it's possible to packet sniff your traffic (which is illegal), see what you're browsing, what your browser is, even part (but not all I believe) of your MAC etc...
Try Pry-Fi
Chainfire already has Pry-Fi for that. It has worked flawlessly for me.
first of all thank you for the commands but somehow this does not work with my Oneplus 3 (without T) on Sultans CM13. The address does not change after entering the commands, the commands do not show any error message.
Any advice?
Furthermore Pry-Fi seems to be able to change the MAC but it crashes sometimes and it seems to loose my saved WiFis. Furthermore i am not able to connect to my home AP after changing the MAC with Pry Fi. :-/
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
Many public, free hotspots that require accepting terms on "walled garden" page today are tracking MAC address, DHCP-assigned IP address, and DHCP lease and active session time stamps. Example hotspots include Starbucks, hotels, etc. These hotspot network operator have logs to trace IPs back to MACs at a specific point in time until the logs are disposed.

G955F Galaxy S8/S8+ Wifi Tether VPN Route for Unlimited Tethering

So I figured I post a guide here for any of you having trouble routing a VPN through the wifi tether interface.
Before I start, you must have a root! Which means this will only work on international varients of the Galaxy S8/S8+ with unlocked bootloader's.
There are plenty of guides online on how to root.
First off, native tethering does NOT use the wlan0 as the interface! Instead the Galaxy S8/S8+ use an interface named swlan0. This means forget all the apps you may have been using like "Android Wifi Tether" etc. You will have to do this manually.
How to setup your phone:
1. First off start buy downloading a VPN app from the play store. My preferred app is "NordVPN" as they offer Netflix and Hulu access. Yes, NordVPN does cost money so your welcome to use any VPN of your choice.
2. Now download an app called "Scripter" from the play store and open it. https://play.google.com/store/apps/details?id=com.faziklogic.scripter
3. Click "Create Script"
4. In the first box name it anything you want like "Tether Hack"
5. In the second box labeled "Commands" copy and paste the below code:
iptables -t filter -F FORWARD
iptables -t nat -F POSTROUTING
iptables -t filter -I FORWARD -j ACCEPT
iptables -t nat -I POSTROUTING -j MASQUERADE
ip rule add from 192.168.43.0/24 lookup 61
ip route add default dev tun0 scope link table 61
ip route add 192.168.43.0/24 dev swlan0 scope link table 61
ip route add broadcast 255.255.255.255 dev swlan0 scope link table 61
And click "Save"
6. (Optional) Download an app called "Wifi Hotspot Widget" https://play.google.com/store/apps/details?id=com.aiuspaktyn.hotspot so you can add it to your home screen layout for quick access to start Android's wifi tethering feature. While your at it make a quick shortcut of the VPN app you chose and the "Scripter" app so you can easily start the tethering with VPN.
7. Now the fun parts, start you VPN first. Then start your Android wifi tethering feature. Finally, open the "Scripter" app and select the script you made earlier. It will ask if you want to run the script, click "YES".
8. Done! Now go ahead and test it out by connecting your computer to the wifi access point you made and visit a website to verify your VPN is working.
Keep in my mind the biggest advantage to this aside from security is that this will NOT use your carriers tethering data usage. So if you have unlimited data but only 7GB of tethering with this trick you WILL have UNLIMITED tethering.
If you have any questions or liked this post please feel free to comment below or PM me anytime!
Reserved
thanks
mfoster978 said:
So I figured I post a guide here for any of you having trouble routing a VPN through the wifi tether interface.
Before I start, you must have a root! Which means this will only work on international varients of the Galaxy S8/S8+ with unlocked bootloader's.
There are plenty of guides online on how to root.
First off, native tethering does NOT use the wlan0 as the interface! Instead the Galaxy S8/S8+ use an interface named swlan0. This means forget all the apps you may have been using like "Android Wifi Tether" etc. You will have to do this manually.
How to setup your phone:
1. First off start buy downloading a VPN app from the play store. My preferred app is "NordVPN" as they offer Netflix and Hulu access. Yes, NordVPN does cost money so your welcome to use any VPN of your choice.
2. Now download an app called "Scripter" from the play store and open it. https://play.google.com/store/apps/details?id=com.faziklogic.scripter
3. Click "Create Script"
4. In the first box name it anything you want like "Tether Hack"
5. In the second box labeled "Commands" copy and paste the below code:
iptables -t filter -F FORWARD
iptables -t nat -F POSTROUTING
iptables -t filter -I FORWARD -j ACCEPT
iptables -t nat -I POSTROUTING -j MASQUERADE
ip rule add from 192.168.43.0/24 lookup 61
ip route add default dev tun0 scope link table 61
ip route add 192.168.43.0/24 dev swlan0 scope link table 61
ip route add broadcast 255.255.255.255 dev swlan0 scope link table 61
And click "Save"
6. (Optional) Download an app called "Wifi Hotspot Widget" https://play.google.com/store/apps/details?id=com.aiuspaktyn.hotspot so you can add it to your home screen layout for quick access to start Android's wifi tethering feature. While your at it make a quick shortcut of the VPN app you chose and the "Scripter" app so you can easily start the tethering with VPN.
7. Now the fun parts, start you VPN first. Then start your Android wifi tethering feature. Finally, open the "Scripter" app and select the script you made earlier. It will ask if you want to run the script, click "YES".
8. Done! Now go ahead and test it out by connecting your computer to the wifi access point you made and visit a website to verify your VPN is working.
Keep in my mind the biggest advantage to this aside from security is that this will NOT use your carriers tethering data usage. So if you have unlimited data but only 7GB of tethering with this trick you WILL have UNLIMITED tethering.
If you have any questions or liked this post please feel free to comment below or PM me anytime!
Click to expand...
Click to collapse
Well cool. Cheers. You just breathed new life into an old fossil. Now I have a new target; something of interest to code for. ??

Categories

Resources