Penetration Testing mailing list archives

Re: arp injection for wifi pentesting


From: Manuel Arostegui Ramirez <manuel () todo-linux com>
Date: Fri, 11 Aug 2006 22:45:28 +0200

El Viernes, 11 de Agosto de 2006 16:08, Fabio Nigi escribió:
hi to all,
i'm pentesting a wifi network in a urban zone for a restourant
that offer "free" wifi connection.
it's wep protected, and i try to inject arp packet to generate more IV


WEP? ;-)

i have same problem using aireplay from the suite aircrack from a
centrino based laptop with debian and a ipw2200 network card.

which method and option, or in other way, wich ather program do you use
to reinject arp packet to get best traffic feedback?


If you want to inject some ARP packets in order to generate IVs, maybe this 
line could do the trick: (Well-Know mac adresses is needed to do that)

aireplay-ng -3 -b 00:13:10:30:24:9C -h 00:11:22:33:44:55 eth0

Where -b is the AP and -h is the client.

Hope it helps


-- 
Manuel Aróstegui Ramírez.

Electronic Mail is not secure, may not be read every day, and should not
be used for urgent or sensitive issues.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: