I don't know if this is the right forum.
I have got a Fonera 2100 running OpenWRT Kamikaze, and all i really want is getting Airpwn to work on it.

I've done a lot of research already, this is where I am at:

Makefile for Airpwn 1.3: https://dev.openwrt.org/browser/pack...ile?format=txt
Patch with this for Airpwn 1.4: http://openwrt.pastebin.com/pastebin.php?dl=m6aa7e9ae

And if i add this to the patch directory: pastebin - collaborative debugging tool (name it 002-big-endian-prism-workaround.patch, normally there already should be a 001-no-python.patch)

If i compile it and run it like that on a clean OpenWRT installation (Not with Jasager patches, yeah i know, but i didn't know where to post else).
I get the error *** unkown type 0.

This seems to be because Radiotap headers are on, when you run aireplay-ng --test ath0, it will change the headers to Prism.

I see all the data packets, but airpwn never triggers, so never injects fake contents.
It seems like it sees that the packets are Data packets, but the contents is somehow unreadable.

I've been talking to a developer of Airpwn (Netroller 3D), It seems like there are still maybe some Endian-problems (Atheros SoC=Big Endian, x86 pc=Little Endian).

Is there anyone who wants to help with this project, i really would like Airpwn on the Fon.

If something wasn't clear enough, please do ask!


Still no answer...?