Related
I've been looking around the forums and google for a solution to this. From what I found, the solution that works for most people with the same problem as me ends up being chnaging the UA String to iPhone or Desktop, but that still doesnt seem to work for me.
Now my problem is that at my school, they set it up to where you have to log into a portal before you can access to the WiFi, but my phone never redirects to the portal. It used to on Windows mobile, but now running Android on NAND, it wont redirect. I've tried nearly every browser on the Android market, tried changing the UA String on all of them. And still nothing. I ended up going to the school's IT Dept, and they registered the Mac Address to my phone, but then told me that my phone was connecting to two different IPs. One being the school IP, the other an unknown IP.
I've looked in the WiFi settings and i cannot find this second IP they gave me. From the sound of it, thats my problem. Any idea on how to remove this second IP? Or if the IT dept. was wrong? If so, and other ideas on how I can connect to this portal?
PS: My phone connects to every other portal website i've gone to so far, except the schools.
hmm strange, normally your WIFI connection connects to only one network. You can find the IP address by calling *#4636#*#* then Wifi Information / Wi-fi Status. Now click Refresh and you'll see your connection info. You can even run a ping test
jorgen2009 said:
hmm strange, normally your WIFI connection connects to only one network. You can find the IP address by calling *#4636#*#* then Wifi Information / Wi-fi Status. Now click Refresh and you'll see your connection info. You can even run a ping test
Click to expand...
Click to collapse
So looking around the forums again I ran into this http://forum.xda-developers.com/showthread.php?t=965597
Not sure if I am reading that right, but the USB Port can have an IP? If thats possible, how can I disable it or change it?
You need update your ROM to one that support unique MAC address or search WIFI MAC to set the MAC address back to your real one. Old Android library on HD2 set the MAC address by using a file so all the phone has a same MAC address by default. You didn't have two IP address. There is someone else running a Android HD2 on the network. Two devices with the same MAC is the same device to the IT Dept. Only one of the device will be routed at any one time.
nightcraw said:
You need update your ROM to one that support unique MAC address or search WIFI MAC to set the MAC address back to your real one. Old Android library on HD2 set the MAC address by using a file so all the phone has a same MAC address by default. You didn't have two IP address. There is someone else running a Android HD2 on the network. Two devices with the same MAC is the same device to the IT Dept. Only one of the device will be routed at any one time.
Click to expand...
Click to collapse
This sounds like it might work. I'm currently art school an unable to change roms. I'll do this when I get home and leave an update.
Sent from my HTC HD2 using XDA App
No need to change rom.
Use search function 'change MAC adress' or something like that.
I'm using a SD Android and needed to change it also, was just a change in startup.txt.
Maybe it is a little different in NAND? But it should be easier to search a little bit around as to re-flash.
(Most or maybe all Android builds have this problem)
If possible, use your WM MAC adress to avoid further problems.
regards
mf_1
mf_1 said:
No need to change rom.
Use search function 'change MAC adress' or something like that.
I'm using a SD Android and needed to change it also, was just a change in startup.txt.
Maybe it is a little different in NAND? But it should be easier to search a little bit around as to re-flash.
(Most or maybe all Android builds have this problem)
If possible, use your WM MAC adress to avoid further problems.
regards
mf_1
Click to expand...
Click to collapse
I ended up changing my rom, and it fixed my problem. Used Hyperdroid GBX, also gave me a chance to install CWM.
But your fix might have worked as well.
His fix will only have worked for sd builds, not NAND. currently, many kernels for nand will give you a unique mac address, but there is no way to set it like there was on sd builds
Sent from my HTC HD2 using XDA App
This is a simple tutorial to allow you to connect to the internet using VPN through your home router.
:NOTE: At present, the steps here are sparse. They assume some technical capability to set things up yourself, this is just kindof a guide as to WHAT you'll need to setup.
Why, you ask? Security. Using a VPN will essentially encrypt your communications though a tunnel back to your home computer. Not going into all that here, basically a simple guide. I assume we're all smart here, so the basics.
Prerequisites
1. DD-WRT V24 Capable router. If you don't have this, then you will need to instead use a different method involving installing software on your PC that I won't cover here. The advantage of the DD-WRT router is ease of setup on the router, and not having to have your computer turned on.
2) Capable Android Phone & Provider. I can't troubleshoot your ROM or provider. Some Android Roms don't support VPN, and it's broken in some. Some providers apparently block it. If your Rom is good and your provider doesn't block it, you're golden. In some cases (such as on the G2X) custom kernels (such as Faux123's) will add the necessary TUN support. Or you may need to add a TUN.KO file if it doesn't... again, device specific, refer to appropriate device forums.
3) If you don't have a static IP (I assume you don't) you'll need a dynamic DNS provider compatible with DD-WRT. I prefer freedns.afraid.org, but you can use any o these: dyndns.org, zoneedit.com, No-Ip.com, 3322.org, easydns.com tzo.com or dynsip.org.
Got all that? Great!
Okay, here's the fun bit.
STEP 1
First, you need to hack your router. It's a LOT like rooting your Android phone. How to do it is BEYOND the scope of what I can write here, but what you need to do is visit http://www.dd-wrt.com and have a look around. Or, you can actually purchase routers with DD-WRT pre-installed. Basically you have to flash a custom ROM onto your router. It needs to support VPN, and be at least version "v24 SP1". Older versions may have a DIFFERENT VPN setup that's not as easy. Don't say I didn't warn you. I flashed the full-featured VOIP version to my router, a Buffalo WHR-G54S.
Unlocking (if necessary) and flashing your router with DD-WRT is a topic as broad as rooting/flashing Android - so I can't help you here. But once it is done, you are ready for....
STEP 2
Setup your dynamic DNS provider. I used http://freedns.afraid.org/ to do this. Basically you go to the site and sign up for the free "subdomain" services. You can pick a name that will be on a number of different domains, such as "us.to", where you could maybe pick something like "kick.us.to" if it isn't taken yet. All that matters is you remember the name.
Next, in DD-WRT, go to the Setup->DDNS tab and select the proper DDNS service and enter the information it asks for -- your service used, username, password and hostname usually. You can usually leave update interval at the default, and normally you don't need to use external IP check.
NOTE: You need to make sure you are not "Double NAT-ed".. this means two routers stacked is a nono. If you have a router connected to a cable/dsl router (instead of a cable/dsl modem), then it needs to be set to BRIDGE mode. Again.. complicated and really a topic best dealt with on its own.
Once you've setup your Dynamic DNS, you're well on your way. You can actually use that hostname for all sorts of things, such as always being able to get Audiogalaxy to connect to the right host without having to know a numeric IP that could change.
STEP 3
You're on a roll... Now, time to setup the VPN in the router. This is done under the Services->VPN tab. If that tab doesn't exist, then you got the wrong version of DD-WRT and need to go back to Step 1.
Enable PPTP Server, Broadcast Support, MPPE Encryption. Under Server IP enter your ROUTER's IP address (usually 192.168.1.1, or whatever you use to connect to your router). Under Client IP's, enter the range of clients on your local network in the format: 192.168.1.100-149 (where 100-149 represents possible IP addresses I've set in DD-WRT for my LAN)... this doesn't seem as important since we'll be connecting from outside.. Just do it.
Under CHAP-Secrets enter in your preferred username and password in the format:
username * password *
that is, the username, a space, *, a space, the password, a space and then *
Save and apply settings. (You need to click both SAVE and APPLY, DD-WRT is weird like this)
STEP 4
Back to Android! Yay! This part of the procedure may vary by phone, but this is how it is on my Gingerbread T-Mobile G2X with faux123's kernel.
Goto Settings->Wireless & Networks->VPN Settings->Add VPN->Add PPTP VPN
VPN Name=whatever you want
VPN server= your dynamic IP name you selected in Step 2
Enable encryption = Yes
now, hit Menu->Save
You should now see your VPN listed under VPNs. Click on it, and select CONNECT. Type in your username and password you selected at the end of Step 3.
It should connect. CONGRATULATIONS!
You should also have a notification in your taskbar that will now let you disconnect from the VPN.
STEP 5
Enjoy! .. wait, what? It didn't work? It did for me!!!
I guess.... ask questions here, or if it appears to be a phone issue, ask in your device's appropriate forum (and link to this thread so people know what guide you're following)
And, if anybody reading this is a better expert in setting this stuff up than I am, feel free to critique/laugh/criticize/constructively comment on this little howto and I'll correct anything I Rick Perry'd.
Nice tutorial! Would have been better if you also included more details in hacking our router
DroidVPN said:
Nice tutorial! Would have been better if you also included more details in hacking our router
Click to expand...
Click to collapse
I would have, but like I said, that's a topic as big as phone hacking itself. Every model of router is going to be different! There may be models that support VPN in the router as well without DD-WRT, but I'm not familiar with that setup.
DD-WRT's website has a pretty huge forum on what routers are compatible and how to set it all up.
The optimal speed can be achieved by the compression of traffic and by minimizing server loads. Web acceleration will enable you bring about a drastic improvement in the web page response time. This kind of acceleration usually come in lesser costs and offers the best web application performance.
So Wat does this do? Keeps u secured from the eyes of the ISP?.. harder for others to hack u?...
Sent from my HTC Desire using xda premium
evilgenius00 said:
So Wat does this do? Keeps u secured from the eyes of the ISP?.. harder for others to hack u?...
Sent from my HTC Desire using xda premium
Click to expand...
Click to collapse
lotherius said:
Security. Using a VPN will essentially encrypt your communications though a tunnel back to your home computer.
Click to expand...
Click to collapse
Yeah, that.
...
10char.
Nice TUT, VPN working
Thanks. I mostly appreciated the idea of using afraid.org.
For some reason, Dyndns and no-ip wouldn't work with ICS as client.
thanks for this tut, keep it up
nice.. thanks for sharing
The cool thing is, once you start hacking your router, you open up all sorts of fun. Like using a virtual wireless network to bridge the open wifi network that gets 1 bar of signal in one little corner of your apartment to be a full strength WPA protected network with your own SSID and subnet that all of your devices can use ... not like I would do such a thing. Now, I *am* a bit afraid to try to set up a VPN on the bridged virtual network..... that could get complicated.
Will this also work with OpenDNS?
Already running DDWRT v24 on WRT600N, and trying to figure this VPN stuff to connect my Atrix running CM10. Thanks for any help
katinatez said:
Will this also work with OpenDNS?
Already running DDWRT v24 on WRT600N, and trying to figure this VPN stuff to connect my Atrix running CM10. Thanks for any help
Click to expand...
Click to collapse
Any service which gives you a stable hostname to the outside network should work.
If you have a higher end router that supports the mega builds (8MB flash), then you can opt for OpenVPN which is more secure than PPTP. Setup is more complicated though.
australix said:
If you have a higher end router that supports the mega builds (8MB flash), then you can opt for OpenVPN which is more secure than PPTP. Setup is more complicated though.
Click to expand...
Click to collapse
Still using a (now antiquated) Buffalo WHR-G54S which has 4MB flash and 16MB Ram... so while it has a lot of features, OpenVPN is lacking... so I can't test that method personally.
This Buffalo is the best router I've ever owned, though. I still can do without gigabit or N networking, so I'm not upgrading. I went through 5 or 6 bad routers (even a Linksys WRT-54G that crashed constantly) before I got this one.
Thanks for all the info here. I've deleted the post because I think my issue is with something else.
Thanks..
p
very...helpfull..!!!
Very easy guide! Thanks!
455
nice cool...
bumpin this because i have a question regarding this, i just set this up and it works great
there are mainly two types of auth vpn servers use, certificate authentication and username/password
i tried to set up password one, and you still need the server public certificate along with username/password, but you don't need client public and private keys unlike with cert auth.
now, i placed the server key, ca.crt, on my internal storage and together with username/password, works great, my concern is security of this file. this file needs to be accessible right, so you can't put it in /etc or /system, having it in internal storage, any app with storage permission can read it... isn't this a security risk? how is this solved? where do i put the file?
thanks
edit: also, how do i *prevent* network traffic without vpn? i know there is always on option and start on boot, but i did, and when the boot finnishes there is a brief moment when the phone connects on mobile network just before initializing vpn and in that brief moment android probably sends all sorts of passwords and data through the network ... how do i delay this until vpn is initialized?
Edit: I successfully got this to work and I made an app that currently supports the Nexus 5X. If you are interested in making it work for the 6P, please PM me.
ViRb3 said:
Hey guys!
I was trying to change the MAC of my Nexus 5X and I thought I did everything right, but I couldn't connect to any WiFi network. I guessed that the Nexus 6P will have an identical method of changing MAC, so I figured I'd share my progress here as well, if anybody can help me or finish the process on their own.
Code:
[B]/persist/[/B]
bdaddr.txt : interface 0 (main) MAC address
wlan_mac.bin : interface 0-3 MAC addresses
Code:
[B]/system/etc/firmware/wlan/qca_cld/[/B]
WCNSS_qcom_cfg.ini : lines 46-50; interface 0-3 MAC addresses
WCNSS_cfg.dat : nothing I could find
Note that the addresses in WCNSS_qcom_cfg.ini are "Assigned MAC Addresses - will be used until NV items are in place".
Thanks!
Click to expand...
Click to collapse
Why would you even want/need to change your MAC address? Sounds weird...
TonzaTheChosenOne said:
Why would you even want/need to change your MAC address? Sounds weird...
Click to expand...
Click to collapse
Here's a list just off the top of my head:
avoid MAC bans by device type (yes, we have those at school)
paid for WiFi at hotel, locked to computer's MAC, change MAC of phone so you can use it instead of computer
avoid device tracking
My cases are 1 and 2
ViRb3 said:
Here's a list just off the top of my head:
avoid MAC bans by device type (yes, we have those at school)
paid for WiFi at hotel, locked to computer's MAC, change MAC of phone so you can use it instead of computer
avoid device tracking
My cases are 1 and 2
Click to expand...
Click to collapse
So... Your school automatically bans phones off from the network? Same for paid hotel wifi? Wth, not here
TonzaTheChosenOne said:
So... Your school automatically bans phones off from the network? Same for paid hotel wifi? Wth, not here
Click to expand...
Click to collapse
Some hotels lock their WiFi to a single MAC when you pay for them.
So this thread was never resolved? Nobody made an app for the 6P? Why create a thread if you don't conclude it?
Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
*** This requires root ***
I have it working in Marshmallow 6.0.1 (not tried it in Nougat)
Only attempt this if you understand MAC Addresses and be sure to note down your original/official MAC Address. Open /persist/wlan_mac.bin and take a copy of the contents before attempting the below.
Some background reading if you're not familiar with MAC Addresses.
Code:
ifconfig wlan0
will tell you all you need to know about the current state of your wireless adapter
The first command generates a MAC Address. I've hardcoded the first 6 characters of mine and randomly generate the remaining 6. It should generate a perfectly valid address but please post if it doesn't (or you have a better bash line).
The second sed command is to replace the MAC Address in the persisted wlan file. It's this command that needs to run as root.
You should be able to run these in something like Termux (make sure you're running as root by running "su" first). I actually run them using Tasker as "Code/Run Shell" commands.
Finally you need to enable then disable Airplane Mode for the change to take affect.
Here are the commands:
Code:
MAC=C0EEFB$(od -txC -An -N3 /dev/random| tr -d ' ')
Code:
sed -i "/Intf0MacAddress=/c\Intf0MacAddress=${MAC}" /persist/wlan_mac.bin
Code:
settings put global airplane_mode_on 1; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state true
Code:
settings put global airplane_mode_on 0; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state false
Code:
ifconfig wlan0 | grep HWaddr
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
BTW, thanks for the share!
bealer said:
Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
Click to expand...
Click to collapse
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
I dont think that it will work since our devices are F2FS i saw this on reddit the other day.
using a custom mac address
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Thanks in advance.
m0d hippĀ„ said:
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
Click to expand...
Click to collapse
Yeah definitely things to improve,automating storing the original being one of them. I'll maybe follow up with that.
I didn't want to mask the main two commands too much with others around them. There are a few (older) ways to do this but this was the only way I could get it to work. And it's not a complete app/solution, more teaching a man to fish sort of thing.
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
You can although
a) OP3T isn't listed as a supported device, I didn't try it
b) You can't automate it with that app very easily. Mine changes via Tasker state/events every day so I don't need to bother doing it myself.
gxyf106 said:
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Click to expand...
Click to collapse
Easiest way is just to change the first command and hardcode the MAC you want, ie
Code:
MAC=C0EEFB998877
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
gxyf106 said:
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
Click to expand...
Click to collapse
Ah oops, that's an error in me typing it out. The 2nd command should contain:
Code:
${MAC}
The brackets were causing it to try and evaluate MAC as a command (rather than a variable). I'll update the OP.
I can confirm this works. many thanks!!
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Michalko5896 said:
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Click to expand...
Click to collapse
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
bealer said:
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
Click to expand...
Click to collapse
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Michalko5896 said:
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Click to expand...
Click to collapse
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
bealer said:
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
Click to expand...
Click to collapse
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
It stops wifi services tracking my phone. For example I use the wifi on the London Underground. Every time I connect to their wifi they'd know exactly where, when, how long, possibly my DNS requests just based on my MAC. It's all information that can be used for profiling or sold on (if that was part of the terms). They still may not known who I am exactly, but I'd rather they weren't able to identify/target me if it meant simply randomising my MAC. As mentioned Android already does this when scanning for networks.
Device Id isn't given, unless you mean hostname (which can be randomised too). If you're using HTTPS based websites then all browser traffic is encrypted via SSL. If you're not, then yeah it's possible to packet sniff your traffic (which is illegal), see what you're browsing, what your browser is, even part (but not all I believe) of your MAC etc...
Try Pry-Fi
Chainfire already has Pry-Fi for that. It has worked flawlessly for me.
first of all thank you for the commands but somehow this does not work with my Oneplus 3 (without T) on Sultans CM13. The address does not change after entering the commands, the commands do not show any error message.
Any advice?
Furthermore Pry-Fi seems to be able to change the MAC but it crashes sometimes and it seems to loose my saved WiFis. Furthermore i am not able to connect to my home AP after changing the MAC with Pry Fi. :-/
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
Many public, free hotspots that require accepting terms on "walled garden" page today are tracking MAC address, DHCP-assigned IP address, and DHCP lease and active session time stamps. Example hotspots include Starbucks, hotels, etc. These hotspot network operator have logs to trace IPs back to MACs at a specific point in time until the logs are disposed.
I have rooted phone with Resurrection remix on it. I have an Iptv provider and it's on my android box.
In order for it to work on phone I need to have the same mac address.
I can see how to change mac but does it affect the phone in any way ie WiFi connections etc
funkyirishman said:
I have rooted phone with Resurrection remix on it. I have an Iptv provider and it's on my android box.
In order for it to work on phone I need to have the same mac address.
I can see how to change mac but does it affect the phone in any way ie WiFi connections etc
Click to expand...
Click to collapse
That's kind of illegal when you spoof Mac adresses to gain access to restricted services you don't want to pay twice
I can watch it on my phone as long as I am not using it on android box.
funkyirishman said:
I can watch it on my phone as long as I am not using it on android box.
Click to expand...
Click to collapse
Have you tried Mac changer app? I think there was one that needed xpoosed not sure though.
Theres plenty of ways to change a Mac. If you want you can just go into file explorer and change it there have you tried that?
Thanks
I'm okay changing it I just want to know if effects anything else on the phone like WiFi password access or password etc
Cheers
funkyirishman said:
Thanks
I'm okay changing it I just want to know if effects anything else on the phone like WiFi password access or password etc
Cheers
Click to expand...
Click to collapse
Changing the layer 2 adress always effects the whole communication since you have a new one. Therefore any devices which communicate with the device needs to learn this new adress(happens automatically normally).
If you have some Mac adress security in devices like access points, soho routers etc. you need to change the Mac there too, otherwise you will be blocked.
But passwords not. If you do something wrong, you can mess up your phone.
Thanks
Just want to make sure that my home network WiFi will still connect automatically or do I need to login WiFi password again
Just be careful, because you can have major issues if your android box and phone are on the same network. The router/switch will potentially route packets to the wrong device, making network access slow and/or unstable.