injection_test
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| injection_test [2008/06/27 22:39] – Small cleanups: make it more obvious that the mac address is just a placeholder, add proper double-dash workaround, and make both interfaces "wlanX", which is the de-facto standard. netrolller3d | injection_test [2013/04/25 11:17] (current) – [Airserv-ng Test] Minor Update jano | ||
|---|---|---|---|
| Line 98: | Line 98: | ||
| * It confirms that the card can inject and successfully communicate with the specified network. | * It confirms that the card can inject and successfully communicate with the specified network. | ||
| + | |||
| Line 106: | Line 107: | ||
| Run the following command: | Run the following command: | ||
| - | | + | |
| Where: | Where: | ||
| * -9 means injection test. | * -9 means injection test. | ||
| - | * -i ath0 is the interface to mimic the AP and receives packets. | + | * -i wlan1 is the interface to mimic the AP and receives packets. |
| * wlan0 is the injection interface. | * wlan0 is the injection interface. | ||
| The system responds: | The system responds: | ||
| - | | + | |
| | | ||
| | | ||
| Line 122: | Line 123: | ||
| | | ||
| - | | + | |
| | | ||
| | | ||
| Line 135: | Line 136: | ||
| Analysis of the response: | Analysis of the response: | ||
| - | * **11: | + | * **11: |
| * The first part of the output is identical to what has been presented earlier. | * The first part of the output is identical to what has been presented earlier. | ||
| * The last part shows that wlan0 card is able to perform all attack types successfully. | * The last part shows that wlan0 card is able to perform all attack types successfully. | ||
| Line 142: | Line 143: | ||
| ==== Airserv-ng Test ==== | ==== Airserv-ng Test ==== | ||
| - | Run the following command: | + | Run Airserv-ng: |
| + | |||
| + | | ||
| + | |||
| + | The system responds: | ||
| + | |||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | |||
| + | Then run the following command: | ||
| | | ||
| Line 187: | Line 199: | ||
| ==== General ==== | ==== General ==== | ||
| - | Make sure the card(s) are on the same channel as your AP. | + | * Make sure you use the correct interface name. |
| - | Make sure your card is not channel | + | * Make sure the card(s) are on the same channel as your AP and locked on this channel. |
| + | * Make sure your card is not channel hopping. | ||
| ==== " | ==== " | ||
injection_test.1214599199.txt.gz · Last modified: by netrolller3d
