fragattacks/research/README.md

31 lines
1.1 KiB
Markdown
Raw Normal View History

2020-04-15 13:43:28 -04:00
# Usage
## Installation
2020-04-20 19:26:15 -04:00
1. **Compile and install backports**
2020-04-20 19:26:15 -04:00
2. Install the dependencies in `../../requirements.txt` (Python3).
3. Compile the modified `hostapd` and `wpa_supplicant` using `cd research && ./build.sh`.
If this fails install the required dependencies. The build.sh script is also very
trivial so you can manually execute each command in that script to see
where it fails and how to fix it.
2020-04-16 18:30:55 -04:00
3. Before proceding, make sure to have pulled all submodules (i.e., libwifi).
## Example Usage
Then you can run `./fragattack.py interface tests` where the first argument
is the interface to use. This inferface should NOT be set to monitor mode
(the script will handle this). The second parameter is the test to execute.
2020-04-15 13:43:28 -04:00
You can first execute a simple ping to see if everything is working:
./fragattack.py wlan0 ping --ip 192.168.100.10 --peerip 192.168.100.1
2020-04-15 13:43:28 -04:00
Here `peerip` is the IP address of the AP/router we are testing, and `ip`
denotes the IP address we are assignment to the client. Edit the file
`client.conf` the specify the SSID and password of the network you are
testing. You should see a message "SUCCESSFULL INJECTION".