few other tools that can be used to answer protocols like ARP and DNS. The tools
wifiarp
and
wifidns
can be used to listen for and respond to those protocols on the
network.
Not all wireless interfaces support packet injection. Packet injection is something that
will be important not only for dumping traffic onto the wireless network but also for
trying to crack passwords that will allow us to get authentication credentials for that
wireless network.
Example 7-5
shows the use of the tool
aireplay-ng
to determine
whether injection works on your system with your interface. You can see from the
result that injection is successful.
Example 7-5. Using aireplay-ng to test packet injection
yazpistachio:root~# aireplay-ng -9 -e TP-Link_862C -a 50:C7:BF:82:86:2C wlan0
21:07:37 Waiting
for
beacon frame
(
BSSID: 50:C7:BF:82:86:2C
)
on channel 5
21:07:37 Trying broadcast probe requests...
21:07:38 Injection is working!
21:07:39 Found
1
AP
21:07:39 Trying directed probe requests...
21:07:39 50:C7:BF:82:86:2C - channel:
5
-
'TP-Link_862C'
21:07:40 Ping
(
min/avg/max
)
: 1.290ms/14.872ms/48.013ms Power: -44.97
21:07:40 29/30: 96%
aireplay-ng
comes with the
aircrack-ng
package and is also capable of running other
attacks, such as fake authentication, ARP replay, and other attacks against authentica‐
tion. All of these attacks are performed using packet injection techniques on the wire‐
less network. This is a key element of running password attacks.