injection_test
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
injection_test [2007/08/13 18:56] – added troubleshooting info regarding madwifi-ng bitrate change problem. darkaudax | injection_test [2013/04/25 11:17] (current) – [Airserv-ng Test] Minor Update jano | ||
---|---|---|---|
Line 24: | Line 24: | ||
An additional feature is the ability to test connectivity to [[airserv-ng]]. | An additional feature is the ability to test connectivity to [[airserv-ng]]. | ||
+ | |||
===== Usage ===== | ===== Usage ===== | ||
- | aireplay-ng -9 -e teddy -a 00:14:6C:7E:40:80 -i wlan0 ath0 | + | aireplay-ng -9 -e teddy -a 00:de:ad:ca:fe:00 -i wlan1 wlan0 |
Where: | Where: | ||
- | * -9 means injection test. Long form is - -test. | + | * -9 means injection test. Long form is -'''' |
* -e teddy is the network name (SSID). | * -e teddy is the network name (SSID). | ||
- | * -a 00:14:6C:7E:40:80 ath0 is MAC address of the access point (BSSID). This is optional. | + | * -a 00:de:ad:ca:fe:00 ath0 is MAC address of the access point (BSSID). This is optional. |
- | * -i wlan0 is interface name of the second card if you want to determine which attacks your card supports. | + | * -i wlan1 is interface name of the second card if you want to determine which attacks your card supports. This interfaces acts as an AP and receives packets. This is optional. |
- | * ath0 is the interface name or airserv-ng IP Address plus port number. | + | * wlan0 is the interface name or airserv-ng IP Address plus port number. This interface is used to send packets. For example - 127.0.0.1: |
- | IMPORTANT: | + | IMPORTANT: |
===== Usage Examples ===== | ===== Usage Examples ===== | ||
Line 97: | Line 98: | ||
* It confirms that the card can inject and successfully communicate with the specified network. | * It confirms that the card can inject and successfully communicate with the specified network. | ||
+ | |||
==== Attack Tests ==== | ==== Attack Tests ==== | ||
- | This test requires two wireless cards. | + | This test requires two wireless cards in monitor mode. The card specified by " |
Run the following command: | Run the following command: | ||
- | | + | |
Where: | Where: | ||
* -9 means injection test. | * -9 means injection test. | ||
- | * -i ath0 is the interface to mimic the AP. | + | * -i wlan1 is the interface to mimic the AP and receives packets. |
* wlan0 is the injection interface. | * wlan0 is the injection interface. | ||
The system responds: | The system responds: | ||
- | | + | |
| | ||
| | ||
Line 121: | Line 123: | ||
| | ||
- | | + | |
| | ||
| | ||
Line 134: | Line 136: | ||
Analysis of the response: | Analysis of the response: | ||
- | * **11: | + | * **11: |
* The first part of the output is identical to what has been presented earlier. | * The first part of the output is identical to what has been presented earlier. | ||
* The last part shows that wlan0 card is able to perform all attack types successfully. | * The last part shows that wlan0 card is able to perform all attack types successfully. | ||
Line 141: | Line 143: | ||
==== Airserv-ng Test ==== | ==== Airserv-ng Test ==== | ||
- | Run the following command: | + | Run Airserv-ng: |
+ | |||
+ | | ||
+ | |||
+ | The system responds: | ||
+ | |||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | |||
+ | Then run the following command: | ||
| | ||
Line 185: | Line 198: | ||
==== General ==== | ==== General ==== | ||
- | Make sure the card(s) are on the same channel as your AP. | ||
- | Make sure your cards are not channel hopping. | + | * Make sure you use the correct interface name. For mac80211 drivers, it is typically " |
+ | * Make sure the card(s) are on the same channel as your AP and locked on this channel. | ||
+ | |||
+ | * Make sure your card is not channel hopping. | ||
==== " | ==== " | ||
Line 203: | Line 218: | ||
Remove the " | Remove the " | ||
+ | |||
+ | ==== Airodump-ng shows APs but they don't respond ==== | ||
+ | |||
+ | The injection test uses broadcast probe requests. | ||
+ | |||
+ | In both cases, try another channel with multiple APs. Or try the specific SSID test described above. | ||
injection_test.1187024191.txt.gz · Last modified: 2007/08/13 18:56 (external edit)