Control Multiple TP Link Smart Plugs (optionally using a Raspberry Pi hub) without using Kasa app
Using softsCheck guide, Reverse Engineering the TP-Link HS110
Instructions are for Ubuntu. Adapt appropriately.
Basic familiarity with the command line is required.
Open up terminal and issue the following commands:
git clone https://github.com/jonbenfri/smart-plug-control
cd smart-plug-control
Smart plugs emit their own WiFi network out of the box or after a full reset. To connect to this network using your master device (computer), scan for networks and find the correct network, e.g. "TP-LINK_Smart Plug_XXXX" where XXXX are the last four hexadecimal numbers in the mac address (see sticker on back of smart plug, unique for each device).
Now that your master device (computer) is connected to the smart plug's WiFi network, you can issue commands. For example:
python2 tplink_smartplug.py -t 192.168.0.1 -c info
python2 tplink_smartplug.py -t 192.168.0.1 -c on
python2 tplink_smartplug.py -t 192.168.0.1 -c off
Basic familiarity with the command line is required.
Open up terminal and issue the following commands:
git clone https://github.com/jonbenfri/smart-plug-control
cd smart-plug-control
Smart plugs emit their own WiFi network out of the box or after a full reset. To connect to this network using your master device (computer), scan for networks and find the correct network, e.g. "TP-LINK_Smart Plug_XXXX" where XXXX are the last four hexadecimal numbers in the mac address (see sticker on back of smart plug, unique for each device).
Now that your master device (computer) is connected to the smart plug's WiFi network, you can issue commands. Issue the following command to configure the smart plug to connect to your secured WiFi network:
python2 tplink_smartplug.py -t 192.168.0.1 -j '{"netif":{"set_stainfo":{"ssid":"SSID","password":"PASSWORD","key_type":3}}}'
Replace SSID and PASSWORD appropriately. NOTE: If your password contains any special characters such as ", ' or \ they must be escaped appropriately.
Your smart plug will immediately stop emitting its own WiFi network and connect to the specified secured WiFi network.
In order to issue commands, you need to find the IP address of your device on the secured WiFi network. Connect your master device (e.g. computer) to the secured network and issue the following commands:
sudo nmap -sP 192.168.0.1/24 | grep -B 2 "XX:XX"
where XX:XX are the last four hexadecimal numbers in the mac address (see sticker on back of smart plug, unique for each device).
Record the IP address of your device.
Now that you have the IP address (DEVICE_IP), you can control multiple devices all on the same secured network. Connect to the secured network with your master device and issue any commands. For example:
python2 tplink_smartplug.py -t DEVICE_IP -c info
python2 tplink_smartplug.py -t DEVICE_IP -c on
python2 tplink_smartplug.py -t DEVICE_IP -c off
Advanced familiarity with the command line and linux are required.
Using Raspberry Pi 3 Model B. Adapt appropriately.
-
Using a computer, copy the Raspbian iso to a micro SD card and mount the card.
For more info, see Download Raspbian for Raspberry Pi
-
Enable SSH by adding an empty file named
ssh
into the boot partition by using the following command:touch /path/to/boot/ssh
Change
/path/to/boot
appropriately. -
(Optional) Configure Raspberry Pi to connect to secured WiFi network. Create a file named
wpa_supplicant.conf
in the boot partition and add the following contents:country=us update_config=1 ctrl_interface=/var/run/wpa_supplicant network={ ssid="<Name of your WiFi>" psk="<Password for your WiFi>" }
Replace country, ssid and psk values appropriately.
-
Safely unmount micro SD card, insert into the Raspberry Pi and boot it up.
For more info, see Setting up a Raspberry Pi headless
Your Raspberry Pi and master device (computer) should now be connected to your network.
-
Find the IP address of the pi:
sudo nmap -Sp 192.168.0.0/24 # Modify IP range and bitmask appropriately for your network settings
-
SSH in as user
pi
and default passwordraspberry
. Change the default password by runningpasswd
(withoutsudo
). -
Enable GPIO shutdown to GPIO21 by adding the following line to `/etc/config.txt':
dtoverlay=gpio-shutdown,gpio_pin=21
Now you can short the last two pins (#39 and #40) to safely shutdown in the event of losing SSH access. Useful for preventing mciro SD Card corruption.
-
Reboot:
sudo reboot
-
Update and upgrade the software:
sudo apt-get update sudo apt-get upgrade sudo rpi-update
-
Edit
/etc/network/interfaces
as follows:## Local (loopback) interface auto lo iface lo inet loopback ## Wired ethernet interface allow-hotplug eth0 iface eth0 inet dhcp ## WiFi interface allow-hotplug wlan0 iface wlan0 inet static address 192.168.0.10 netmask 255.255.255.0
Note: The static ip address assigned here may conflict with other devices if using a WiFi network for initial access. Be sure to perform a network scan first and pick another ip address if a potential conflict arises.
-
Disable
wpa_supplicant
:sudo systemctl disable wpa_supplicant sudo systemctl mask wpa_supplicant
-
Install dnsmasq and hostapd:
sudo apt install dnsmasq hostapd
-
Stop
dnsmasq
andhostapd
services:sudo systemctl stop dnsmasq sudo systemctl stop hostapd
-
Back up original
dnsmaq
configuration:sudo mv /etc/dnsmasq.conf /etc/dnsmasq.conf.orig
-
Create
/etc/dnsmasq.conf
with the following content:interface=wlan0 # Use the require wireless interface - usually wlan0 dhcp-range=192.168.0.1,192.168.0.20,255.255.255.0,24h no-resolv
Adjust the IP range, subnet mask and lease time as desired. Ensure static IP specified in
/etc/network/interfaces
is in the range specified indnsmasq.conf
. -
Reload
dnsmasq
configuration:sudo systemctl restart dnsmasq sudo systemctl reload dnsmasq
-
Edit
/etc/hostapd/hostapd.conf
so it contains the following:interface=wlan0 driver=nl80211 ssid=SSID hw_mode=g channel=7 wmm_enabled=0 macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=0 wpa=2 wpa_passphrase=WPA_PASSPHRASE wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP rsn_pairwise=CCMP
Replace
SSI
,hw_mode
,channel
andwpa_passphrase
values appropriately.ssid
andwpa_passphrase
should not have quotes around them andwpa_passphrase
must be 8-64 characters long. -
Edit
/etc/default/hostapd
so it reads:DAEMON_CONF="/etc/hostapd/hostapd.conf"
-
Disable and mask wpa_supplicant. Start
hostapd
and make surehostapd
anddnsmaq
are running properly:sudo systemctl unmask hostapd sudo systemctl enable hostapd sudo systemctl start hostapd sudo systemctl status hostapd sudo systemctl status dnsmasq
-
Reboot:
sudo reboot
-
You should now see the ssid live. Connect to it and ssh in after connecting, using the static ip specified in
/etc/network/interfaces
:ssh pi@192.168.0.10
For more info, see: Setting up a Raspberry Pi as a Wireless Access Point
Follow Basic Setup (Secured WiFi Network) as above, specifying the SSID and PASSWORD for your Raspberry Pi access point as configured in the previous steps.