User Tools

Site Tools


arp_amplification

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
arp_amplification [2007/06/15 16:55] – added links mister_xarp_amplification [2018/03/11 20:09] (current) – Removed link to trac mister_x
Line 8: Line 8:
   * [[http://download.aircrack-ng.org/wiki-files/other/arp-2x.cap|arp-2x.cap]]   * [[http://download.aircrack-ng.org/wiki-files/other/arp-2x.cap|arp-2x.cap]]
   * [[http://download.aircrack-ng.org/wiki-files/other/arp-3x.cap|arp-3x.cap]]   * [[http://download.aircrack-ng.org/wiki-files/other/arp-3x.cap|arp-3x.cap]]
 +
  
 ===== Introduction ===== ===== Introduction =====
Line 18: Line 19:
  
 It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it. It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it.
- 
-I would like to acknowledge and thank the aircrack-ng team for producing such a great robust tool.  
  
 Please send me any constructive feedback, positive or negative. Please send me any constructive feedback, positive or negative.
Line 70: Line 69:
 It also assumes you know the IP address of various devices on the network.   Chopchop is the most effective way to determine IP addresses since it decrypts packets for you.  In turn, looking at the decrypted packet will give you the IP address and network being used.  You can guess the network and typical IPs based on the manufacturer of the Access Point.  The manufacturer can typically be determined via the MAC address.  Same for DHCP pools which have standard defaults in each brand.  The last method is simply what most people pick as network numbers. It also assumes you know the IP address of various devices on the network.   Chopchop is the most effective way to determine IP addresses since it decrypts packets for you.  In turn, looking at the decrypted packet will give you the IP address and network being used.  You can guess the network and typical IPs based on the manufacturer of the Access Point.  The manufacturer can typically be determined via the MAC address.  Same for DHCP pools which have standard defaults in each brand.  The last method is simply what most people pick as network numbers.
    
-More research is being done on using interactive replay with live packets as an alternate method instead building packets from scratch.  Once this techique is refined, the tutorial will be updated and rereleased.+More research is being done on using interactive replay with live packets as an alternate method instead building packets from scratch.  Once this technique is refined, the tutorial will be updated and re-released.
  
 ===Scenario One - One for one ARP packets === ===Scenario One - One for one ARP packets ===
  
-This is typical of what occurs when you use [[http://aircrack-ng.org/doku.php?id=arp-request_reinjection|ARP request reinjection]].  Although it does not provide any extra amplification, we study it for educational purposes and to provide a baseline measurement of the injection speed.  In simple terms, for each ARP request that we inject, you get one new IV by the AP rebroadcasting it.+This is typical of what occurs when you use [[arp-request_reinjection|ARP request reinjection]]. Although it does not provide any extra amplification, we study it for educational purposes and to provide a baseline measurement of the injection speed.  In simple terms, for each ARP request that we inject, you get one new IV by the AP rebroadcasting it.
  
 We generate an ARP request to inject: We generate an ARP request to inject:
Line 183: Line 182:
 Lets look at part of the capture.  The [[http://download.aircrack-ng.org/wiki-files/other/arp-3x.cap|arp-3x.cap]] is a representative subset of the full capture. Lets look at part of the capture.  The [[http://download.aircrack-ng.org/wiki-files/other/arp-3x.cap|arp-3x.cap]] is a representative subset of the full capture.
  
-Use Wireshark to review the capture along with the following description.  The easiest way is to use "View --> Expand" Here is a description of the relevant packets:+Use Wireshark to review the capture along with the following description.  The easiest way is to use "View --> Expand". Here is a description of the relevant packets:
  
   * Packet 1: Your standard beacon.   * Packet 1: Your standard beacon.
Line 196: Line 195:
 If you count, there were three new IVs generated per cycle - packets  4, 5 and 7. If you count, there were three new IVs generated per cycle - packets  4, 5 and 7.
  
 +===== Important note =====
 +
 +The speed you can achieve depends on the hardware used. By the Access point as well as your hardware.
 +
 +See [[http://forum.aircrack-ng.org/index.php?topic=1960.0|this thread]] for more information.
arp_amplification.txt · Last modified: 2018/03/11 20:09 by mister_x