broadcom
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
broadcom [2006/11/21 14:06] – added working link to ignore-memory patch. webgovernor | broadcom [2009/05/03 23:28] – Update links to forum mister_x | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | =====Broadcom bcm43xx===== | + | ======= Broadcom bcm43xx |
- | As of 2.6.17, a driver for the Broadcom bcm43xx wireless chipset has been included in the kernel. Older kernels can sometimes be made to work, check out resources available [[http:// | + | As of 2.6.17, a driver for the Broadcom bcm43xx wireless chipset has been included in the kernel. Older kernels can sometimes be made to work, check out resources available [[http:// |
- | Download the bcm43xx inject_nofcs patch for the 2.6.17 kernel from [[http://tinyshell.be/aircrackng/ | + | **Note: As of 2.6.24, this driver is considered deprecated, and you might be better off using the new [[b43]] driver instead. (B43 supports the fragmentation attack, and it's much more stable than bcm43xx.)** |
+ | |||
+ | ===== Is My Card Supported? ===== | ||
+ | |||
+ | Most broadcom cards are supported EXCEPT the following: | ||
+ | |||
+ | * PCI ID 14e4:4315 | ||
+ | * Wireless-N | ||
+ | |||
+ | To determine the PCI ID of your wireless device under linux, enter: | ||
+ | |||
+ | lspci -nn | ||
+ | |||
+ | |||
+ | =====Alternate Patch===== | ||
+ | There is a patch by SuD which dramatically improves the injection speed: | ||
+ | |||
+ | * See http://www.latinsud.com/ | ||
+ | |||
+ | Also see this [[http://forum.aircrack-ng.org/ | ||
+ | |||
+ | Use this patch instead of the one below. | ||
+ | |||
+ | |||
+ | =====Patching the kernel===== | ||
+ | * Download the [[http:// | ||
+ | * Place the patch in your kernel sources directory | ||
+ | * Run 'patch -p1 -i bcm43xx-injection-linux-2.6.20.patch' | ||
+ | <sub>This patch may not apply directly and may require that you modify the bcm43xx_main.c | ||
+ | * Recompile | ||
+ | * The module should now be ready to use for injection. | ||
+ | * Remember to reload the kernel driver or reboot your system before trying to inject packets. | ||
+ | |||
+ | |||
+ | =====Testing the new module===== | ||
+ | |||
+ | After building and installing the new module, it is best to test that injection is working correctly. | ||
+ | |||
+ | |||
+ | ===== Usage Tips ===== | ||
+ | |||
+ | Forum thread: | ||
+ | [[http:// | ||
+ | |||
+ | Forum thread: | ||
+ | [[http:// | ||
+ | |||
+ | This forum thread may also provide some useful information: | ||
+ | |||
+ | |||
+ | =====Known problems===== | ||
+ | The bcm43xx has been verified to produce all attacks. However, there a few known problems. | ||
+ | * aireplay exits with "out of memory error" / syslog shows "out of DMA slots" | ||
+ | < | ||
+ | * packets per second is adjusted to around 25 pps | ||
+ | < | ||
+ | * syslog shows a lot of failed assertions (!ring-> | ||
+ | < | ||
+ | |||
+ | All these problems should be mitigated or fixed with the new patch! | ||
+ | |||
+ | |||
+ | =====Troubleshooting Tips===== | ||
+ | |||
+ | |||
+ | ==== Confirm you are running the new module ==== | ||
+ | |||
+ | First, double check that you are in fact running the new module: | ||
+ | |||
+ | | ||
+ | |||
+ | It will give you the fully qualified file name. Do "ls -l <fully qualified file name>" | ||
+ | |||
+ | This thread has a number of potential fixes to problems you may encounter: [[http:// | ||
+ | |||
+ | |||
+ | |||
+ | ==== Why do I get ioctl(SIOCGIFINDEX) failed ? ==== | ||
+ | |||
+ | If you get error messages similar to: | ||
+ | |||
+ | * Error message: " | ||
+ | * Error message: " | ||
+ | |||
+ | Then [[http:// | ||
- | Because the bcm43xx injection scheme is rather, ahem, unconventional, | ||
- | \\ | ||
- | \\ | ||
- | **Patches: | ||
- | * [[http:// | ||
- | * [[http:// | ||
- | * [[http:// | ||
- | \\ | ||
- | The bcm43xx has been verified to produce successful deauths and fakeauths, but other attacks await confirmation. Please contribute to the [[http:// | ||
broadcom.txt · Last modified: 2017/01/09 21:27 by mister_x