官术网_书友最值得收藏!

Time for action – packet injection

We will be using the aireplay-ng tool which is available in BackTrack for this exercise.

Follow these instructions carefully:

  1. In order to do an injection test, first start Wireshark and the filter expression (wlan.bssid == 00:21:91:d2:8e:25) && !(wlan.fc.type_subtype == 0x08). This will ensure that we only see non-beacon packets for our lab network.
  2. Now run the following command aireplay-ng -9 -e Wireless Lab -a 00:21:91:d2:8e:25 mon0 on a terminal:
  3. Go back to Wireshark and you should see a lot of packets on the screen now. Some of these packets have been sent by aireplay-ng which we launched, and others are from the access point Wireless Lab in response to the injected packets:

What just happened?

We just successfully injected packets into our test lab network using aireplay-ng. It is important to note that our card injected these arbitrary packets into the network without actually being connected to the access point Wireless Lab.

Have a go hero – installing BackTrack on Virtual Box

We will look at packet injection in greater detail in later chapters; however, feel free to explore other options of the aireplay-ng tool to inject packets. You can verify that injection succeeded by using Wireshark to monitor the air.

主站蜘蛛池模板: 承德县| 南陵县| 即墨市| 连平县| 涞水县| 双流县| 灵寿县| 会同县| 大安市| 环江| 舒城县| 岢岚县| 安宁市| 齐齐哈尔市| 军事| 广东省| 沙湾县| 湘潭县| 陕西省| 平昌县| 枣强县| 赤水市| 大宁县| 望江县| 磐安县| 浏阳市| 乌苏市| 门头沟区| 靖江市| 青铜峡市| 中阳县| 抚宁县| 金秀| 聂拉木县| 达日县| 宽城| 中超| 阿合奇县| 栖霞市| 务川| 沁阳市|