broadcom
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| broadcom [2007/02/04 20:18] – moved outdated message mister_x | broadcom [2017/01/09 21:27] (current) – Mark page as deprecated. mister_x | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | =======Broadcom bcm43xx (outdated)======= | + | ====== |
| - | As of 2.6.17, a driver for the Broadcom bcm43xx wireless chipset has been included in the kernel. Older kernels | + | **IMPORTANT NOTE**: This page is deprecated, updated documentation |
| - | Download the bcm43xx | + | ======= Broadcom |
| + | |||
| + | As of 2.6.17, a driver for the Broadcom bcm43xx wireless chipset has been included in the kernel. Older kernels can sometimes be made to work, check out resources available | ||
| + | |||
| + | **Note: As of 2.6.24, | ||
| + | |||
| + | ===== Is My Card Supported? ===== | ||
| + | |||
| + | Most broadcom cards are supported EXCEPT the following: | ||
| + | |||
| + | * PCI ID 14e4:4315 | ||
| + | * Wireless-N | ||
| + | |||
| + | To determine the PCI ID of your wireless device under linux, enter: | ||
| + | |||
| + | lspci -nn | ||
| + | |||
| + | |||
| + | =====Alternate Patch===== | ||
| + | There is a patch by SuD which dramatically improves the injection speed: | ||
| + | |||
| + | * See http:// | ||
| + | |||
| + | Also see this [[http:// | ||
| + | |||
| + | Use this patch instead of the one below. | ||
| + | |||
| + | |||
| + | =====Patching the kernel===== | ||
| + | * Download the [[http:// | ||
| + | * Place the patch in your kernel sources directory | ||
| + | * Run 'patch -p1 -i bcm43xx-injection-linux-2.6.20.patch' | ||
| + | <sub>This patch may not apply directly and may require that you modify the bcm43xx_main.c | ||
| + | * Recompile | ||
| + | * The module should now be ready to use for injection. | ||
| + | * Remember to reload the kernel driver or reboot your system before trying to inject packets. | ||
| + | |||
| + | |||
| + | =====Testing the new module===== | ||
| + | |||
| + | After building and installing the new module, it is best to test that injection is working correctly. | ||
| + | |||
| + | |||
| + | ===== Usage Tips ===== | ||
| + | |||
| + | Forum thread: | ||
| + | [[http:// | ||
| + | |||
| + | Forum thread: | ||
| + | [[http:// | ||
| + | |||
| + | This forum thread may also provide some useful information: | ||
| + | |||
| + | |||
| + | =====Known problems===== | ||
| + | The bcm43xx has been verified to produce all attacks. However, there a few known problems. | ||
| + | * aireplay exits with "out of memory error" / syslog shows "out of DMA slots" | ||
| + | < | ||
| + | * packets per second is adjusted to around 25 pps | ||
| + | < | ||
| + | * syslog shows a lot of failed assertions (!ring-> | ||
| + | < | ||
| + | |||
| + | All these problems should be mitigated or fixed with the new patch! | ||
| + | |||
| + | |||
| + | =====Troubleshooting Tips===== | ||
| + | |||
| + | |||
| + | ==== Confirm you are running the new module ==== | ||
| + | |||
| + | First, double check that you are in fact running the new module: | ||
| + | |||
| + | | ||
| + | |||
| + | It will give you the fully qualified file name. Do "ls -l <fully qualified file name>" | ||
| + | |||
| + | This thread has a number of potential fixes to problems you may encounter: [[http:// | ||
| + | |||
| + | |||
| + | |||
| + | ==== Why do I get ioctl(SIOCGIFINDEX) failed ? ==== | ||
| + | |||
| + | If you get error messages similar to: | ||
| + | |||
| + | * Error message: " | ||
| + | * Error message: " | ||
| + | |||
| + | Then [[faq# | ||
| - | Because the bcm43xx injection scheme is rather, ahem, unconventional, | ||
| - | \\ | ||
| - | \\ | ||
| - | **Patches: | ||
| - | * First patch, detects and uses a bcm43xx device. Crashes aireplay-ng after a certain number of packets have been injected (link dead). | ||
| - | * [[http:// | ||
| - | * A different workaround (do not attempt to use this patch with other cards) (link does not exist). | ||
| - | \\ | ||
| - | The bcm43xx has been verified to produce successful deauths and fakeauths, but other attacks await confirmation. Please contribute to the [[http:// | ||
broadcom.1170616721.txt.gz · Last modified: by mister_x
