{"id":535,"date":"2011-02-24T07:10:34","date_gmt":"2011-02-24T06:10:34","guid":{"rendered":"http:\/\/blog.kodono.info\/wordpress\/?p=535"},"modified":"2012-04-30T12:33:47","modified_gmt":"2012-04-30T10:33:47","slug":"hack-de-la-bbox-pour-android-astuce","status":"publish","type":"post","link":"https:\/\/blog.kodono.info\/wordpress\/2011\/02\/24\/hack-de-la-bbox-pour-android-astuce\/","title":{"rendered":"Hack de la BBox pour Android [Astuce]"},"content":{"rendered":"<p>[niveau interm\u00e9diaire]<\/p>\n<p><strong>EDIT:<\/strong> une application Android existe maintenant pour BBox (et autres box) : <a href=\"http:\/\/blog.kodono.info\/wordpress\/2012\/04\/30\/penetrate-apk-android\/\">Penetrate<\/a>.<\/p>\n<p>La nouvelle a rapidement fait le <a href=\"http:\/\/www.papygeek.com\/hacking\/pirater-le-wifi-dune-bbox-en-30-secondes\/\">tour du web<\/a> : le mot de pass wifi par d\u00e9faut de la BBox de Bouygues Telecom se retrouve tr\u00e8s facilement \u00e0 partir du nom du r\u00e9seau (appel\u00e9 SSID). Ainsi on trouve un script pour Windows, et un autre pour Linux.<br \/>\nJ&#8217;ai d\u00e9cid\u00e9 de transcrire ce script pour Android gr\u00e2ce au projet <a href=\"https:\/\/code.google.com\/p\/android-scripting\/\">Android Scripting<\/a>.<\/p>\n<p><strong>Comment cela fonctionne ?<\/strong><\/p>\n<p>Il suffit d&#8217;installer l&#8217;<a href=\"https:\/\/code.google.com\/p\/android-scripting\/downloads\/list\">application SL4A<\/a>. Ouvrez l&#8217;application, puis &#8220;Menu&#8221; et &#8220;View&#8221;. Choisissez &#8220;Interpreters&#8221;, puis &#8220;Menu&#8221; et &#8220;Add&#8221;. Prenez &#8220;Python&#8221; dans la liste propos\u00e9e. Cela va t\u00e9l\u00e9charger l&#8217;interpr\u00e9teur Python que vous devrez installer, puis ouvrir, et enfin suivre les instructions.<\/p>\n<p>Ensuite il vous faut r\u00e9cup\u00e9rer le script python : <a href=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/hack_bbox_Android.py\">hack_bbox_Android.py<\/a><\/p>\n<p>Maintenant connectez votre t\u00e9l\u00e9phone \u00e0 l&#8217;ordinateur, activez le p\u00e9riph\u00e9rique de stockage USB, et allez dans dans le r\u00e9pertoire &#8220;sl4a&#8221; qui doit se trouver \u00e0 la racine, puis placez le script dans&#8230; &#8220;scripts&#8221; \ud83d\ude42<\/p>\n<p>D\u00e9connectez votre t\u00e9l\u00e9phone de l&#8217;USB, et lancez SL4A, et enfin le script nomm\u00e9 &#8220;Hack_BBox_android.py&#8221;.<\/p>\n<p>Votre t\u00e9l\u00e9phone (ou votre tablette) va vous montrer les r\u00e9seaux Wifi disponibles autour de vous (pensez \u00e0 activer le wifi avant!). Il suffit d&#8217;en choisir un qui commence par BBox pour que le script se mette \u00e0 chercher la cl\u00e9 correspondante. Selon la puissance de votre t\u00e9l\u00e9phone, l&#8217;op\u00e9ration peut prendre jusqu&#8217;\u00e0 15 min (temps constat\u00e9 sur un HTC Hero, alors qu&#8217;il faut que 2 min sur une tabelette Toshiba Folio 100).<\/p>\n<p>Captures d&#8217;\u00e9cran :<br \/>\n<a href=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_093349.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_093349-200x300.png\" alt=\"\" title=\"Choisir le wifi\" width=\"200\" height=\"300\" class=\"aligncenter size-medium wp-image-537\" srcset=\"https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_093349-200x300.png 200w, https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_093349.png 320w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><br \/>\n<a href=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_094722.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_094722-200x300.png\" alt=\"\" title=\"Le process commence\" width=\"200\" height=\"300\" class=\"aligncenter size-medium wp-image-538\" srcset=\"https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_094722-200x300.png 200w, https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_094722.png 320w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><br \/>\n<a href=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_095841.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_095841-200x300.png\" alt=\"\" title=\"R\u00e9sultat\" width=\"200\" height=\"300\" class=\"aligncenter size-medium wp-image-539\" srcset=\"https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_095841-200x300.png 200w, https:\/\/blog.kodono.info\/wordpress\/wp-content\/uploads\/2011\/02\/snap20110224_095841.png 320w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[niveau interm\u00e9diaire] EDIT: une application Android existe maintenant pour BBox (et autres box) : Penetrate. La nouvelle a rapidement fait le tour du web : le mot de pass wifi par d\u00e9faut de la BBox de Bouygues Telecom se retrouve tr\u00e8s facilement \u00e0 partir du nom du r\u00e9seau (appel\u00e9 SSID). Ainsi on trouve un script [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","hide_page_title":"","footnotes":""},"categories":[98,7,15,13,33,9],"tags":[99,153,112,158,149,100],"class_list":["post-535","post","type-post","status-publish","format-standard","hentry","category-android","category-application","category-astuce","category-niveau-intermediaire","category-programmation","category-securite","tag-android-2","tag-astuce","tag-hack","tag-programmation","tag-securite","tag-wifi"],"_links":{"self":[{"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/posts\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/comments?post=535"}],"version-history":[{"count":5,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/posts\/535\/revisions"}],"predecessor-version":[{"id":1026,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/posts\/535\/revisions\/1026"}],"wp:attachment":[{"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/media?parent=535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/categories?post=535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.kodono.info\/wordpress\/wp-json\/wp\/v2\/tags?post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}