aireplay-ng - inject packets into a wireless network to generate traffic
aireplay-ng [options] <replay interface>
aireplay-ng is used to inject/replay frames. The primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys. There are different attacks which can cause deauthentications for the purpose of capturing WPA handshake data, fake authentications, Interactive packet replay, hand-crafted ARP request injection and ARP-request reinjection. With the packetforge-ng tool it's possible to create arbitrary frames. aireplay-ng supports single-NIC injection/monitor. This feature needs driver patching.
-H, --help
Shows the help screen.
Filter options:
-b <bssid>
MAC address of access point.
-d <dmac>
MAC address of destination.
-s <smac>
MAC address of source.
-m <len>
Minimum packet length.
-n <len>
Maximum packet length.
-u <type>
Frame control, type field.
-v <subt>
Frame control, subtype field.
-t <tods>
Frame control, "To" DS bit (0 or 1).
-f <fromds>
Frame control, "From" DS bit (0 or 1).
-w <iswep>
Frame control, WEP bit (0 or 1).
-D Disable AP Detection.
Replay options:
-x <nbpps>
Number of packets per second.
-p <fctrl>
Set frame control word (hex).
-a <bssid>
Set Access Point MAC address.
-c <dmac>
Set destination MAC address.
-h <smac>
Set source MAC address.
-g <nb_packets>
Change ring buffer size (default: 8 packets). The minimum is 1.
-F Choose first matching packet.
-e <essid>
Fake Authentication attack: Set target SSID (see below). For
SSID containing special characters, see http://www.aircrack-
ng.org/doku.php?id=faq#how_to_use_spaces_double_quote_and_single_quote_etc._in_ap_names
-o <npackets>
Fake Authentication attack: Set the number of packets for every
authentication and association attempt (Default: 1). 0 means
auto
-q <seconds>
Fake Authentication attack: Set the time between keep-alive
packets in fake authentication mode.
-Q Fake Authentication attack: Sends reassociation requests instead
of performing a complete authentication and association after
each delay period.
-y <prga>
Fake Authentication attack: Specifies the keystream file for
fake shared key authentication.
-T n Fake Authentication attack: Exit if fake authentication fails
'n' time(s).
-j ARP Replay attack : inject FromDS pakets (see below).
-k <IP>
Fragmentation attack: Set destination IP in fragments.
-l <IP>
Fragmentation attack: Set source IP in fragments.
-B Test option: bitrate test.
Source options:
-i <iface>
Capture packets from this interface.
-r <file>
Extract packets from this pcap file.
Miscellaneous options:
-R disable /dev/rtc usage.
--ignore-negative-one if the interface's channel can't be determined
ignore the mismatch, needed for unpatched cfg80211
Attack modes:
-0 <count>, --deauth=<count>
This attack sends deauthentication packets to one or more
clients which are currently associated with a particular access
point. Deauthenticating clients can be done for a number of
reasons: Recovering a hidden ESSID. This is an ESSID which is
not being broadcast. Another term for this is "cloaked" or
Capturing WPA/WPA2 handshakes by forcing clients to
reauthenticate or Generate ARP requests (Windows clients
sometimes flush their ARP cache when disconnected). Of course,
this attack is totally useless if there are no associated
wireless client or on fake authentications.
-1 <delay>, --fakeauth=<delay>
The fake authentication attack allows you to perform the two
types of WEP authentication (Open System and Shared Key) plus
associate with the access point (AP). This is only useful when
you need an associated MAC address in various aireplay-ng
attacks and there is currently no associated client. It should
be noted that the fake authentication attack does NOT generate
any ARP packets. Fake authentication cannot be used to
authenticate/associate with WPA/WPA2 Access Points.
-2, --interactive
This attack allows you to choose a specific packet for replaying
(injecting). The attack can obtain packets to replay from two
sources. The first being a live flow of packets from your
wireless card. The second being from a pcap file. Reading from a
file is an often overlooked feature of aireplay-ng. This allows
you read packets from other capture sessions or quite often,
various attacks generate pcap files for easy reuse. A common use
of reading a file containing a packet your created with
packetforge-ng.
-3, --arpreplay
The classic ARP request replay attack is the most effective way
to generate new initialization vectors (IVs), and works very
reliably. The program listens for an ARP packet then retransmits
it back to the access point. This, in turn, causes the access
point to repeat the ARP packet with a new IV. The program
retransmits the same ARP packet over and over. However, each ARP
packet repeated by the access point has a new IVs. It is all
these new IVs which allow you to determine the WEP key.
-4, --chopchop
This attack, when successful, can decrypt a WEP data packet
without knowing the key. It can even work against dynamic WEP.
This attack does not recover the WEP key itself, but merely
reveals the plaintext. However, some access points are not
vulnerable to this attack. Some may seem vulnerable at first but
actually drop data packets shorter that 60 bytes. If the access
point drops packets shorter than 42 bytes, aireplay tries to
guess the rest of the missing data, as far as the headers are
predictable. If an IP packet is captured, it additionally checks
if the checksum of the header is correct after guessing the
missing parts of it. This attack requires at least one WEP data
packet.
-5, --fragment
This attack, when successful, can obtain 1500 bytes of PRGA
(pseudo random generation algorithm). This attack does not
recover the WEP key itself, but merely obtains the PRGA. The
PRGA can then be used to generate packets with packetforge-ng
which are in turn used for various injection attacks. It
requires at least one data packet to be received from the access
point in order to initiate the attack.
-6, --caffe-latte
In general, for an attack to work, the attacker has to be in the
range of an AP and a connected client (fake or real). Caffe
Latte attacks allows one to gather enough packets to crack a WEP
key without the need of an AP, it just need a client to be in
range.
-7, --cfrag
This attack turns IP or ARP packets from a client into ARP
request against the client. This attack works especially well
against ad-hoc networks. As well it can be used against softAP
clients and normal AP clients.
-8, --migmode
This attack works against Cisco Aironet access points configured
in WPA Migration Mode, which enables both WPA and WEP clients to
associate to an access point using the same Service Set
Identifier (SSID). The program listens for a WEP-encapsulated
broadcast ARP packet, bitflips it to make it into an ARP coming
from the attacker's MAC address and retransmits it to the access
point. This, in turn, causes the access point to repeat the ARP
packet with a new IV and also to forward the ARP reply to the
attacker with a new IV. The program retransmits the same ARP
packet over and over. However, each ARP packet repeated by the
access point has a new IV as does the ARP reply forwarded to the
attacker by the access point. It is all these new IVs which
allow you to determine the WEP key.
-9, --test
Tests injection and quality.
Fragmentation:
Pros
- Can obtain the full packet length of 1500 bytes XOR. This
means you can subsequently pretty well create any size of
packet.
- May work where chopchop does not
- Is extremely fast. It yields the XOR stream extremely quickly
when successful.
Cons
- Setup to execute the attack is more subject to the device
drivers. For example, Atheros does not generate the correct
packets unless the wireless card is set to the mac address you
are spoofing.
- You need to be physically closer to the access point since if
any packets are lost then the attack fails.
Chopchop
Pro
- May work where frag does not work.
Cons
- Cannot be used against every access point.
- The maximum XOR bits is limited to the length of the packet
you chopchop against.
- Much slower then the fragmentation attack.
This manual page was written by Adam Cecile <[email protected]> for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common- licenses/GPL.
airbase-ng(8) airmon-ng(8) airodump-ng(8) airodump-ng-oui-update(8) airserv-ng(8) airtun-ng(8) besside-ng(8) easside-ng(8) tkiptun-ng(8) wesside-ng(8) aircrack-ng(1) airdecap-ng(1) airdecloak-ng(1) airolib-ng(1) besside-ng-crawler(1) buddy-ng(1) ivstools(1) kstats(1) makeivs-ng(1) packetforge-ng(1) wpaclean(1)
Personal Opportunity - Free software gives you access to billions of dollars of software at no cost. Use this software for your business, personal use or to develop a profitable skill. Access to source code provides access to a level of capabilities/information that companies protect though copyrights. Open source is a core component of the Internet and it is available to you. Leverage the billions of dollars in resources and capabilities to build a career, establish a business or change the world. The potential is endless for those who understand the opportunity.
Business Opportunity - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies know about open source and how open source can give you the advantage.
Free Software provides computer programs and capabilities at no cost but more importantly, it provides the freedom to run, edit, contribute to, and share the software. The importance of free software is a matter of access, not price. Software at no cost is a benefit but ownership rights to the software and source code is far more significant.
Free Office Software - The Libre Office suite provides top desktop productivity tools for free. This includes, a word processor, spreadsheet, presentation engine, drawing and flowcharting, database and math applications. Libre Office is available for Linux or Windows.
The Free Books Library is a collection of thousands of the most popular public domain books in an online readable format. The collection includes great classical literature and more recent works where the U.S. copyright has expired. These books are yours to read and use without restrictions.
Source Code - Want to change a program or know how it works? Open Source provides the source code for its programs so that anyone can use, modify or learn how to write those programs themselves. Visit the GNU source code repositories to download the source.
Study at Harvard, Stanford or MIT - Open edX provides free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses for almost all major subjects and course levels. Open edx also offers some paid courses and selected certifications.
Linux Manual Pages - A man or manual page is a form of software documentation found on Linux/Unix operating systems. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts.