injection_test
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
injection_test [2008/06/27 22:39] – Small cleanups: make it more obvious that the mac address is just a placeholder, add proper double-dash workaround, and make both interfaces "wlanX", which is the de-facto standard. netrolller3d | injection_test [2012/08/17 23:30] – [Usage] jano | ||
---|---|---|---|
Line 34: | Line 34: | ||
* -9 means injection test. Long form is -'''' | * -9 means injection test. Long form is -'''' | ||
* -e teddy is the network name (SSID). | * -e teddy is the network name (SSID). | ||
- | * -a 00: | + | * -b 00: |
* -i wlan1 is interface name of the second card if you want to determine which attacks your card supports. | * -i wlan1 is interface name of the second card if you want to determine which attacks your card supports. | ||
* wlan0 is the interface name or airserv-ng IP Address plus port number. | * wlan0 is the interface name or airserv-ng IP Address plus port number. | ||
Line 98: | Line 98: | ||
* It confirms that the card can inject and successfully communicate with the specified network. | * It confirms that the card can inject and successfully communicate with the specified network. | ||
+ | |||
Line 106: | Line 107: | ||
Run the following command: | Run the following command: | ||
- | | + | |
Where: | Where: | ||
* -9 means injection test. | * -9 means injection test. | ||
- | * -i ath0 is the interface to mimic the AP and receives packets. | + | * -i wlan1 is the interface to mimic the AP and receives packets. |
* wlan0 is the injection interface. | * wlan0 is the injection interface. | ||
The system responds: | The system responds: | ||
- | | + | |
| | ||
| | ||
Line 122: | Line 123: | ||
| | ||
- | | + | |
| | ||
| | ||
Line 135: | Line 136: | ||
Analysis of the response: | Analysis of the response: | ||
- | * **11: | + | * **11: |
* The first part of the output is identical to what has been presented earlier. | * The first part of the output is identical to what has been presented earlier. | ||
* The last part shows that wlan0 card is able to perform all attack types successfully. | * The last part shows that wlan0 card is able to perform all attack types successfully. | ||
Line 187: | Line 188: | ||
==== General ==== | ==== General ==== | ||
- | Make sure the card(s) are on the same channel as your AP. | + | * Make sure you use the correct interface name. |
- | Make sure your card is not channel | + | * Make sure the card(s) are on the same channel as your AP and locked on this channel. |
+ | * Make sure your card is not channel hopping. | ||
==== " | ==== " |
injection_test.txt · Last modified: 2013/04/25 11:17 by jano