Time for action – packet injection
We will be using the aireplay-ng
tool, which is available in Kali, for this exercise.
Follow these instructions carefully:
- In order to do an injection test, first start Wireshark and the filter expression
(wlan.bssid == <mac>) && !(wlan.fc.type_subtype == 0x08)
. This will ensure that we only see non-beacon packets for our lab network. - Now run the
aireplay-ng -9 -e Wireless Lab -a <mac> wlan0mon
command in a terminal. - Go back to Wireshark and you should see a lot of packets on the screen now. Some of these packets have been sent by
aireplay-ng
, which we launched, and others are from the access pointWireless Lab
in response to the injected packets.
What just happened?
We just successfully injected packets into our test lab network using aireplay-ng
. It is important to note that our card injected these arbitrary packets into the network without being actually connected to the access point Wireless Lab
.