
Adding sensors (not tested yet) It's not just a repeater Customizing/Modifying firmware (open source) There are plenty of forms in which you can hack or modify the Kortex Xtend Lite repeater: This means you could observe on with which sites your users are communicating, or even steal packets. From any computer in the external network you can now observe the traffic in the internal network in real time.

Port Mirroring Feature: This amazing feature mirrors the traffic of the internal network in PCAP format to a TCP stream. MQTT Device Management Feature: Kortex Xtend Lite has a built-in MQTT client, which allows you to transform your repeater into an IoT device that can monitor power (load), connected stations, bitrate, etc. Board viewĮach repeater configured in automesh mode will automatically offer a WiFi network on the access point with the same SSID/password as it is connected to, and it will first search for the best other access point to connect to, and this is the one which is closest to the original WiFi network and has the best signal strength. Use this to observe with which internet sites your clients are communicating. With a " netcat | sudo wireshark -k -S -i -" from a computer in the external network you can now observe the traffic in the internal network in real time. This service mirrors the traffic of the internal network in PCAP format into a TCP stream. Once you make sure someone is connected to your Kortex Xtend Lite (by running " show" command) from your console or Telnet terminal start a monitor service by running " monitor on " Remember that many factors like trees, houses, weather and distance can cause WiFi bandwidth to go down, and eventually, if you increase the number of repeaters (up to 8) the available bandwidth will almost disappear, so please keep that in mind :)Ĭapture data from connected clients: In order of being able to capture connected clients data, firstly you must set the repeater as an open WiFi access point (see *commands list, documentation and tutorials - up)

If you fly the drones, automatically the repeaters will form a mesh network and you'll be able to provide WiFi connectivity to your clients (IoT sensors, neighbours, etc.). Protect your connected devices: The advantage of using this NAT repeater is the IP masquerading feature that protects your devices (computer, IoT sensors, etc.) identity by implementing a network address translation procedure that gives your devices a unique private IP address hidden behind a single public IP address (repeater IP address), so you can keep a bunch of devices hidden from hackers.ĭeploy aerial WiFi zones with drones (mesh) *not tested yet: Do you want to provide WiFi to a large area? That's possible if you can get a bunch of drones and attach to them another bunch of Kortex Xtend Lite repeaters set to "mesh" mode. Remember that this repeater only provides information about the network (and of course other great features), and it cannot do things a computer does, so when I say hacking, that means from your computer, the repeater is only a little "spy"


If the drone moves to too far from the AP, you could fail at sending commands, and also while receiving data. Your drone should be on air at least 15min.
