mirror of
https://github.com/colonelpanichacks/flock-you.git
synced 2026-04-23 21:39:59 -07:00
datasets: add @NitekryDPaul WiFi OUI research
30 Flock Safety infrastructure OUIs discovered through 2.4 GHz promiscuous-mode analysis by @NitekryDPaul, including the addr1 receiver-side detection technique that catches Flock STAs during their burst-sleep duty cycles when addr2-only sniffs miss them.
This commit is contained in:
99
datasets/NitekryDPaul_wifi_ouis.md
Normal file
99
datasets/NitekryDPaul_wifi_ouis.md
Normal file
@@ -0,0 +1,99 @@
|
||||
# Flock Safety WiFi OUIs — Research by @NitekryDPaul
|
||||
|
||||
**Researcher:** ØяĐöØцяöЪöяцฐ (**@NitekryDPaul**)
|
||||
|
||||
This dataset documents Flock Safety and related surveillance-infrastructure WiFi MAC-address OUIs (first three octets) discovered through 2.4 GHz promiscuous-mode analysis. All 30 prefixes below were identified by @NitekryDPaul during his promiscuous-mode research on Flock camera air traffic.
|
||||
|
||||
## Why promiscuous mode
|
||||
|
||||
Flock stations spend most of their duty cycle asleep, waking briefly to upload and then sleeping again. During the sleep windows a passive sniffer will never see them transmit — but it can still see them named as the **destination** (addr1) of probe responses and data frames from nearby APs. Matching on addr1 in addition to addr2 therefore reveals devices that a transmitter-only sniff would miss entirely.
|
||||
|
||||
This addr1 technique is @NitekryDPaul's discovery and is the basis of the `promiscuis-flock-you` firmware.
|
||||
|
||||
## OUI list (30 prefixes, lowercase, colon-separated)
|
||||
|
||||
```
|
||||
70:c9:4e
|
||||
3c:91:80
|
||||
d8:f3:bc
|
||||
80:30:49
|
||||
b8:35:32
|
||||
14:5a:fc
|
||||
74:4c:a1
|
||||
08:3a:88
|
||||
9c:2f:9d
|
||||
c0:35:32
|
||||
94:08:53
|
||||
e4:aa:ea
|
||||
f4:6a:dd
|
||||
f8:a2:d6
|
||||
24:b2:b9
|
||||
00:f4:8d
|
||||
d0:39:57
|
||||
e8:d0:fc
|
||||
e0:4f:43
|
||||
b8:1e:a4
|
||||
70:08:94
|
||||
58:8e:81
|
||||
ec:1b:bd
|
||||
3c:71:bf
|
||||
58:00:e3
|
||||
90:35:ea
|
||||
5c:93:a2
|
||||
64:6e:69
|
||||
48:27:ea
|
||||
a4:cf:12
|
||||
```
|
||||
|
||||
## CSV form
|
||||
|
||||
| oui | vendor_context | detection_protocol | source |
|
||||
|---|---|---|---|
|
||||
| 70:c9:4e | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 3c:91:80 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| d8:f3:bc | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 80:30:49 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| b8:35:32 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 14:5a:fc | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 74:4c:a1 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 08:3a:88 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 9c:2f:9d | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| c0:35:32 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 94:08:53 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| e4:aa:ea | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| f4:6a:dd | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| f8:a2:d6 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 24:b2:b9 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 00:f4:8d | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| d0:39:57 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| e8:d0:fc | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| e0:4f:43 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| b8:1e:a4 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 70:08:94 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 58:8e:81 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| ec:1b:bd | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 3c:71:bf | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 58:00:e3 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 90:35:ea | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 5c:93:a2 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 64:6e:69 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| 48:27:ea | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
| a4:cf:12 | Flock Safety infrastructure | WiFi 2.4 GHz | @NitekryDPaul |
|
||||
|
||||
## Detection strategy
|
||||
|
||||
For each observed 802.11 management or data frame:
|
||||
|
||||
1. Skip if multicast (addr1 byte 0 bit 0 set) — filters broadcasts, 33:33:* groups, etc.
|
||||
2. Skip if locally-administered (byte 0 bit 1 set) — filters randomised MACs
|
||||
3. Match `addr2` (transmitter) against the OUI list
|
||||
4. Match `addr1` (receiver) against the OUI list — **the addr1 insight**
|
||||
5. Optional: match `addr3` (BSSID) on mgmt frames when addr2 is randomised
|
||||
|
||||
## Firmware
|
||||
|
||||
The `promiscuis-flock-you` firmware implementing this research is a mod of @NitekryDPaul's promiscuous-mode firmware. It emits Flask-compatible JSON over USB for ingestion by the `flock-you` dashboard and persists detections to on-device SPIFFS.
|
||||
|
||||
## Credit
|
||||
|
||||
All OUI research and the promiscuous-mode detection strategy are the work of **@NitekryDPaul**. Please cite him when using or redistributing this list.
|
||||
Reference in New Issue
Block a user