Return to site

Atheros Powerline Toolkit

broken image


The Qualcomm Atheros Open Powerline Toolkitis a collection of small, command line programs. Each program deals with some aspect of powerline device management. Programs can be combined, in various ways, using shell scripts, to perform sophisticated and complex tasks.

Qualcomm Atheros Open Powerline Toolkit

So, I just botched a firmware update on one of my PowerLine couplers. The model I had trouble with is a TP-Link TL-PA4020P. However, this quick guide should work with pretty much any Atheros-based PLC device. It was confirmed working on at least a TL-WPA4220 as well. Steps to Reproduce. Download manufacturer's setup tool. Atheros Powerline Toolkit Calculo Larson Pdf 9 Ediciones Sandilyan Tamil Historical Novels Pdf Free Download Download Film Drama Korea Terbaru 2015 Subtitle Indonesia John Deere American Farmer Patch Unknown Version Rama Charita Manasa Telugu Pdf Panasonic Kx-tda200 Maintenance Console Passware Kit Enterprise 13.5 Crack.

/ *

Atheros powerline toolkit app
  • Copyright (c) 2013 Qualcomm Atheros, Inc.*
  • All rights reserved.*
  • Redistribution and use in source and binary forms, with or
  • without modification, are permitted (subject to the limitations
  • in the disclaimer below) provided that the following conditions
  • are met:*
  • * Redistributions of source code must retain the above copyright
  • notice, this list of conditions and the following disclaimer.*
  • * Redistributions in binary form must reproduce the above
  • copyright notice, this list of conditions and the following
  • disclaimer in the documentation and/or other materials
  • provided with the distribution.*
  • * Neither the name of Qualcomm Atheros nor the names of
  • its contributors may be used to endorse or promote products
  • derived from this software without specific prior written
  • permission.*
  • NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
  • GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE
  • COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR
  • IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  • WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  • PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  • OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  • SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  • NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  • LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  • HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  • CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  • OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  • SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    *--------------------------------------------------------------------/

This package is an open version of the Qualcomm Atheros PowerlineToolkit. It may be distributed as a zip, gzip or bzip2 tarball thatcontains source code and build scripts for Linux, OpenBSD, MAC OSXand Microsoft Windows. It also contains documentation in docbook XML,HTML and plain text format.

Securecrt mac download

We recommend that you open file docbook/index.html with a web browserthe read Chapter 1 before attempting to install or use the toolkitbut the impatient may do the following and survive..

Atheros Powerline Toolkit App

TO INSTALL

  1. Enter package folder using cd open-plc-utils.
  2. Compile all tools using make.
  3. Install all tools to /usr/local/bin using sudo make install.
  4. Compile and install man pages in /usr/share/man/man1 using sudo make manuals.5 Change to the documentation folder using cd docbook.
  5. Add page index.html to browser favorites.
  6. Add page toolkit.html to browser favorites.

Note: 'make' is assumed to be the GNU make command (often available under the name 'gmake').

TO UNINSTALL

  1. Enter package folder using cd open-plc-utils.
  2. Remove installed programs using sudo make uninstall.
  3. Remove all package files using rm -r *.
Toolkit
  • Copyright (c) 2013 Qualcomm Atheros, Inc.*
  • All rights reserved.*
  • Redistribution and use in source and binary forms, with or
  • without modification, are permitted (subject to the limitations
  • in the disclaimer below) provided that the following conditions
  • are met:*
  • * Redistributions of source code must retain the above copyright
  • notice, this list of conditions and the following disclaimer.*
  • * Redistributions in binary form must reproduce the above
  • copyright notice, this list of conditions and the following
  • disclaimer in the documentation and/or other materials
  • provided with the distribution.*
  • * Neither the name of Qualcomm Atheros nor the names of
  • its contributors may be used to endorse or promote products
  • derived from this software without specific prior written
  • permission.*
  • NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
  • GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE
  • COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR
  • IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  • WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  • PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  • OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  • SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  • NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  • LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  • HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  • CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  • OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  • SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    *--------------------------------------------------------------------/

This package is an open version of the Qualcomm Atheros PowerlineToolkit. It may be distributed as a zip, gzip or bzip2 tarball thatcontains source code and build scripts for Linux, OpenBSD, MAC OSXand Microsoft Windows. It also contains documentation in docbook XML,HTML and plain text format.

We recommend that you open file docbook/index.html with a web browserthe read Chapter 1 before attempting to install or use the toolkitbut the impatient may do the following and survive..

Atheros Powerline Toolkit App

TO INSTALL

  1. Enter package folder using cd open-plc-utils.
  2. Compile all tools using make.
  3. Install all tools to /usr/local/bin using sudo make install.
  4. Compile and install man pages in /usr/share/man/man1 using sudo make manuals.5 Change to the documentation folder using cd docbook.
  5. Add page index.html to browser favorites.
  6. Add page toolkit.html to browser favorites.

Note: 'make' is assumed to be the GNU make command (often available under the name 'gmake').

TO UNINSTALL

  1. Enter package folder using cd open-plc-utils.
  2. Remove installed programs using sudo make uninstall.
  3. Remove all package files using rm -r *.

Note: 'make' is assumed to be the GNU make command (often available under the name 'gmake').

CONTRIBUTORS

Alejandro Vasquez avasquez@qca.qualcomm.comAbdel Younes younes@leacom.frAndrew Barnes abarnes@qca.qualcomm.comBill Wike bwike@qca.qualcomm.comCharles MaierChristian Aurich christian.aurich@i2se.comFlorian Fainelli f.fainelli@gmail.comGuenther Kelleter guenther.kelleter@devolo.deMarc BertolaMathieu Olivari mathieu.olivari@gmail.comMathieu Poullet m.poullet@avm.deMichael Heimpold mhei@heimpold.deNathaniel Houghton nathan@brainwerk.orgNing Shang nshang@qti.qualcomm.comPouyan Sepehrdad pouyans@qti.qualcomm.comStefan Wahren stefan.wahren@i2se.comWerner Henze w.henze@avm.de

  1. Adelstein, F., Stillerman, M., Kozen, D.: Malicious code detection for open firmware. In: Proceedings of 18th Annual Computer Security Applications Conference, pp. 403–412. IEEE (2002)Google Scholar
  2. Akhawe, D., Barth, A., Lam, P., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 290–304. IEEE (2010)Google Scholar
  3. Alliance, H.P.: IEEE 1901 HD-PLC Complete technical overview (2012). http://www.hd-plc.org/modules/about/hdplc.html
  4. Alliance, H.P.: HomePlug AV Specification (2014)Google Scholar
  5. Alliance, H.P.: HomePlug Powerline Networking Technology Hits Maturation as Global Broadband Standard (2016)Google Scholar
  6. Alves, F.: Vulnerability discovery in power line communications. Ph.D. thesis, Universidade de Lisboa (2015)Google Scholar
  7. Baker, R., Martinovic, I.: EMPower: detecting malicious power line networks from EM emissions. In: Janczewski, L.J., Kutylowski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 108–121. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99828-2_8CrossRefGoogle Scholar
  8. Barth, A., Jackson, C., Mitchell, J.: Robust defenses for cross-site request forgery. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 75–88. ACM (2008)Google Scholar
  9. Berger, L.T., Schwager, A., Pagani, P., Schneider, D.: MIMO Power Line Communications: Narrow and Broadband Standards, EMC, and Advanced Processing. CRC Press Inc., Boca Raton (2014)Google Scholar
  10. Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy, pp. 538–552. IEEE (2012)Google Scholar
  11. Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45539-6_12CrossRefGoogle Scholar
  12. Cano, C., Pittolo, A., Malone, D., Lampe, L., Tonello, A., Dabak, A.: State of the art in power line communications: from the applications to the medium. IEEE J. Sel. Areas Commun. 34(7), 1935–1952 (2016)CrossRefGoogle Scholar
  13. Cui, A., Costello, M., Stolfo, S.: When firmware modifications attack: a case study of embedded exploitation. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, 24–27 February 2013. The Internet Society (2013)Google Scholar
  14. Dudek, S.: HomePlugAV PLC: practical attacks and backdooring (2015)Google Scholar
  15. Dürmuth, M., Güneysu, T., Kasper, M., Paar, C., Yalcin, T., Zimmermann, R.: Evaluation of standardized password-based key derivation against parallel processing platforms. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 716–733. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33167-1_41CrossRefGoogle Scholar
  16. Qualcomm Atheros via Github: Qualcomm Atheros Open Powerline Toolkit (2018). https://github.com/qca/open-plc-utils
  17. GlobalData: Smart Meters, Update 2018 - Global Market Size, Competitive Landscape, Key Country Analysis, and Forecast to 2022 (2018)Google Scholar
  18. IEEE Standards Association and Others: IEEE standard for broadband over power line networks: medium access control and physical layer specifications. IEEE Std (2010), 1–1586 (2010)Google Scholar
  19. IEEE Standards Association and Others: IEEE standard for broadband over power line networks: medium access control and physical layer specifications - amendment 1: enhancement for internet of things applications. IEEE Std (2010), 1–118 (2019)Google Scholar
  20. Jennings, C., Narayanan, A., Burnett, D., Bergkvist, A.: WebRTC 1.0: Real-time Communication Between Browsers (2014)Google Scholar
  21. Kaliski, B.: PKCS #5: password-based cryptography specification version 2.0, September 2000. http://tools.ietf.org/rfc/rfc2898.txt, rFC2898
  22. Latinov, L.: MD5, SHA-1, SHA-256 and SHA-512 speed performance (2018)Google Scholar
  23. Matchen, M.: What Is Powerline Technology? (2015). https://www.tomshardware.com/reviews/network-switch-guide,4047.html
  24. Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting domestic power-line communications. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 122–132. ACM (2006)Google Scholar
  25. Newman, R., Yonge, L., Gavette, S., Anderson, R.: HomePlug AV security mechanisms. In: 2007 IEEE International Symposium on Power Line Communications and its Applications, pp. 366–371. IEEE (2007)Google Scholar
  26. OWASP: Information exposure through query strings in URL (2017). https://www.owasp.org/index.php/Information_exposure_through_query_strings_in_url
  27. Paruchuri, V., Durresi, A., Ramesh, M.: Securing powerline communications. In: 2008 IEEE International Symposium on Power Line Communications and its Applications, pp. 64–69. IEEE (2008)Google Scholar
  28. Puppe, A., Vanderauwera, J., Bartels, D.: HomePlug Security (2010)Google Scholar
  29. Salem, A., Hamdi, K., Alsusa, E.: Physical layer security over correlated log-normal cooperative power line communication channels. IEEE Access 5, 13909–13921 (2017)CrossRefGoogle Scholar
  30. Scholz, R., Wressnegger, C.: Security analysis of Devolo HomePlug devices. In: Proceedings of the 12th European Workshop on Systems Security, pp. 7:1–7:6. ACM (2019)Google Scholar
  31. Shiflett, C.: Security Corner: Cross-Site Request Forgeries. Shiflett.org (2004). http://shiflett.org/articles/cross-site-request-forgeries
  32. Sunguk, L.: Security issues of power line multi-home networks for seamless. Data Transmission (2011)Google Scholar
  33. Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. Int. J. Secur. Netw. 4(1–2), 87–100 (2009)CrossRefGoogle Scholar
  34. Tasker, B.: Infiltrating a Network via Powerline (HomePlug AV) Adapters (2014). https://www.bentasker.co.uk/documentation/security/282-infiltrating-a-network-via-powerline-homeplugav-adapters
  35. Tiwari, A.: Electricity meters' reading comparison: electromechanical, electronic and smart meters (2016)Google Scholar
  36. Ur, B., Bees, J., Segreti, S., Bauer, L., Christin, N., Cranor, L.: Do users' perceptions of password security match reality? In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3748–3760. ACM (2016)Google Scholar




broken image