airbase-ng
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
airbase-ng [2009/09/26 21:08] – Fixed typos darkaudax | airbase-ng [2010/03/30 19:14] – fixed interface name in explanation of the command mister_x | ||
---|---|---|---|
Line 175: | Line 175: | ||
==== -y Disable Broadcast Probes ==== | ==== -y Disable Broadcast Probes ==== | ||
- | When using this option, the fake AP will not respond to broadcast probes. | + | When using this option, the fake AP will not respond to broadcast probes. |
==== -0 Set WPA/WEP Tags ==== | ==== -0 Set WPA/WEP Tags ==== | ||
Line 276: | Line 276: | ||
* -d 00: | * -d 00: | ||
* -w specifies the file name prefix of the captured data | * -w specifies the file name prefix of the captured data | ||
- | * ath0 specifies the wireless interface to capture data on | + | * wlan0 specifies the wireless interface to capture data on |
Here is what the window looks like when airbase-ng has received a packet from the client and has successfully started the attack: | Here is what the window looks like when airbase-ng has received a packet from the client and has successfully started the attack: | ||
Line 410: | Line 410: | ||
* -c 9 specifies the channel | * -c 9 specifies the channel | ||
- | * -d 00: | + | * -d 00: |
* -w specifies the file name of the captured data | * -w specifies the file name of the captured data | ||
* wlan0 specifies the wireless interface to capture data on | * wlan0 specifies the wireless interface to capture data on | ||
Line 478: | Line 478: | ||
==== How Does the Hirte Attack Work? ==== | ==== How Does the Hirte Attack Work? ==== | ||
- | This is client attack which can use any IP or ARP packet. | + | This is a client attack which can use any IP or ARP packet. |
The basic idea is to generate an ARP request to be sent back to the client such that the client responds. | The basic idea is to generate an ARP request to be sent back to the client such that the client responds. | ||
Line 491: | Line 491: | ||
In all cases, bit flipping is used to ensure the CRC is correct. | In all cases, bit flipping is used to ensure the CRC is correct. | ||
+ | |||
+ | ==== SoftAP with Internet connection and MITM sniffing ==== | ||
+ | |||
+ | This [[http:// | ||
+ | |||
===== Usage Troubleshooting ===== | ===== Usage Troubleshooting ===== | ||
Line 508: | Line 513: | ||
See this [[http:// | See this [[http:// | ||
+ | ==== Error creating tap interface: Permission denied ==== | ||
+ | |||
+ | See the following [[faq# | ||
===== Related Commands ===== | ===== Related Commands ===== |
airbase-ng.txt · Last modified: 2018/03/11 18:54 by mister_x