[injectiontest tom@goto10**20071026224823] { adddir ./wifi/doc/injectiontest_files addfile ./wifi/doc/injectiontest.html hunk ./wifi/doc/injectiontest.html 1 - + +
+ + ++ Important note: This option is only available on aircrack-ng 0.9 and up. +
+ +The injection test determines if your card can successfully inject +and determine the ping response times to the Access Point (AP). If you +have two wireless cards, it can also determine which specific injection +tests can be successfully performed. +
+ +The basic injection test provides additional valuable information as +well. First, it lists access points in the area which respond to +broadcast probes. Second, for each, it does a 30 packet test that +indicates the connection quality. This connection quality quantifies +the ability of your card to successfully send and then receive a +response to the test packet. The percentage of responses received gives +an excellent indication of the link quality. +
+ ++You may optionally specify the AP name and MAC address. This can be used to test a specific AP or test a hidden SSID. +
+ ++So how does it work? The following will briefly describe how the testing is performed. +
+ +The program initially sends out broadcast probe requests. These are +probe requests which ask any AP listening to respond with a description +of itself. Not every AP will respond to this type of request. A list of +responding APs is assembled to be used in subsequent steps. If any AP +responds, a messages is printed on the screen indicating that the card +can successfully inject. +
+ ++At the same time, any AP identified via a beacon packet is also added to the list of APs to be processed in subsequent steps. +
+ +If a specific AP was optionally listed on the command line (BSSID +and SSID), this is also added to the list of APs to be processed. +
+ +Then for each AP in the list, 30 directed probe requests are sent +out. A directed probe request is addressed to a specific AP. The count +of probe responses received plus the percentage is then printed on the +screen. This indicates if you can communicate with the AP and how well. +
+ ++If two wireless cards were specified then each attack mode is tried and the results printed on the screen. +
+ ++An additional feature is the ability to test connectivity to airserv-ng. +Once the basic connectivity test is completed then it proceeds with the +standard injection tests via the wireless card linked to airserv-ng. +
+ ++ aireplay-ng -9 -e teddy -a 00:14:6C:7E:40:80 -i wlan0 ath0 +
+ ++Where: +
++ IMPORTANT: You must set your card to the desired channel with airmon-ng prior to running any of the tests. +
+ ++ This is a basic test to determine if you card successfully supports injection. +
+aireplay-ng -9 wlan0+ +
+ The system responds: +
+16:29:41 wlan0 channel: 9 + 16:29:41 Trying broadcast probe requests... + 16:29:41 Injection is working! + 16:29:42 Found 5 APs + + 16:29:42 Trying directed probe requests... + 16:29:42 00:09:5B:5C:CD:2A - channel: 11 - 'NETGEAR' + 16:29:48 0/30: 0% + 16:29:48 00:14:BF:A8:65:AC - channel: 9 - 'title' + 16:29:54 0/30: 0% + 16:29:54 00:14:6C:7E:40:80 - channel: 9 - 'teddy' + 16:29:55 Ping (min/avg/max): 2.763ms/4.190ms/8.159ms + 16:29:55 27/30: 90% + 16:29:55 00:C0:49:E2:C4:39 - channel: 11 - 'mossy' + 16:30:01 0/30: 0% + 16:30:01 00:0F:66:C3:14:4E - channel: 9 - 'tupper' + 16:30:07 0/30: 0%+ +
+ Analysis of the response: +
++ You can check a hidden SSID or check a specific SSID with the following command: +
+aireplay-ng --test -e teddy -a 00:14:6C:7E:40:80 ath0+ +
+ The system responds: +
+11:01:06 ath0 channel: 9 + 11:01:06 Trying broadcast probe requests... + 11:01:06 Injection is working! + 11:01:07 Found 1 APs + + 11:01:07 Trying directed probe requests... + 11:01:07 00:14:6C:7E:40:80 - channel: 9 - 'teddy' + 11:01:07 Ping (min/avg/max): 2.763ms/4.190ms/8.159ms + 11:01:07 30/30: 100%+ +
+ Analysis of the response: +
++ This test requires two wireless cards. The card specified by ”-i” acts as the access point. +
+ ++Run the following command: +
+aireplay-ng -9 -i ath0 wlan0+ +
+ Where: +
++ The system responds: +
+11:06:05 wlan0 channel: 9, ath0 channel: 9 + 11:06:05 Trying broadcast probe requests... + 11:06:05 Injection is working! + 11:06:05 Found 1 APs + + 11:06:05 Trying directed probe requests... + 11:06:05 00:14:6C:7E:40:80 - channel: 9 - 'teddy' + 11:06:05 Ping (min/avg/max): 2.763ms/4.190ms/8.159ms + 11:06:07 26/30: 87% + + 11:06:07 Trying card-to-card injection... + 11:06:07 Attack -0: OK + 11:06:07 Attack -1 (open): OK + 11:06:07 Attack -1 (psk): OK + 11:06:07 Attack -2/-3/-4: OK + 11:06:07 Attack -5: OK+ +
+ Analysis of the response: +
++ Run the following command: +
+aireplay-ng -9 127.0.0.1:666+ +
+ Where: +
++ The system responds: +
+14:57:23 Testing connection to injection device 127.0.0.1:666 + 14:57:23 TCP connection successful + 14:57:23 airserv-ng found + 14:57:23 ping 127.0.0.1:666 (min/avg/max): 0.310ms/0.358ms/0.621ms + + Connecting to 127.0.0.1 port 666... + Connection successful + + 14:57:24 127.0.0.1:666 channel: 9 + 14:57:24 Trying broadcast probe requests... + 14:57:24 Injection is working! + 14:57:25 Found 1 AP + + 14:57:25 Trying directed probe requests... + 14:57:25 00:14:6C:7E:40:80 - channel: 9 - 'teddy' + 14:57:26 Ping (min/avg/max): 1.907ms/38.308ms/39.826ms + 14:57:26 30/30: 100%+ +
+ Analysis of the response: +
++ Nothing at this point in time. +
+ ++Make sure the card(s) are on the same channel as your AP. +
+ ++Make sure your cards are not channel hopping. +
+ ++ If you get error messages similar to the following for Atheros-based cards and the madwifi-ng driver: +
+aireplay-ng -9 -e teddy -a 00:14:6C:7E:40:80 -B ath0 + Interface ath0 -> driver: Madwifi-NG + 12:36:30 ath0 channel: 10 + 12:36:30 Trying broadcast probe requests... + write failed: Network is down + wi_write(): Network is down+ +
Remove the ”-B” bitrate option from the request. There is an +underlying problem with the madwifi-ng driver concerning changing +bitrates on the fly. Simply put, you cannot currently change bitrates +on the fly. A request has been made to the madwifi-ng developers to fix +this. Until this is done, you cannot use the ”-B” option with +madwifi-ng drivers. +
+ +