mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
30 lines
1.1 KiB
Python
Executable File
30 lines
1.1 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
from libwifi import *
|
|
import argparse, time
|
|
|
|
def main():
|
|
parser = argparse.ArgumentParser(description="Test packet injection properties of a device.")
|
|
parser.add_argument('inject', help="Interface to use to inject frames.")
|
|
parser.add_argument('monitor', nargs='?', help="Interface to use to monitor for frames.")
|
|
options = parser.parse_args()
|
|
|
|
subprocess.check_output(["rfkill", "unblock", "wifi"])
|
|
|
|
set_monitor_mode(options.inject)
|
|
if options.monitor:
|
|
set_monitor_mode(options.monitor)
|
|
if get_channel(options.inject) != get_channel(options.monitor):
|
|
log(ERROR, "Both devices are not on the same channel")
|
|
quit(1)
|
|
else:
|
|
log(WARNING, "Only performing selftest. This can detect only injection issues caused by")
|
|
log(WARNING, "the kernel. Many other issues cannot be detected in this self-test,so you")
|
|
log(WARNING, "should not trust the output of the tests unless you know what you're doing.")
|
|
|
|
log(STATUS, "Performing injection tests ...")
|
|
test_injection(options.inject, options.monitor, peermac="00:11:22:33:44:55")
|
|
|
|
if __name__ == "__main__":
|
|
main()
|
|
|