Denial of Service (DOS) on Wifi using Ostinato Linux

I will create a separate software installation page.

Install Ostinato packet generator and all updates: http://software.opensuse.org /download.html?project=home:pstavirs:ostinato&package=ostinato

I use Ubuntu 12.04 LTS

sudo echo 'deb http://download.opensuse.org/repositories/home:pstavirs:ostinato/xUbuntu_12.04/ /' >> /etc/apt/sources.list

sudo apt-get update

sudo apt-get install ostinato

Install wifi-radar, airmon-ng or aircrack, and wireshark.

https://file.army/i/BY26GDl
Open wifi-radar and check the wifi you want to test. Here my wifi sensor.

For the wireless adapter to be monitored:

sudo ifconfig wlan0 is down

sudo iwconfig wlan0 monitor mode

sudo ifconfig wlan0 up

If you do this, you cannot connect to the hotspot. To restore as before, do the above but "sudo iwconfig wlan0 managed mode".

https://file.army/i/BY26lCs
I do something else because I want to use the internet, which is using airmon-ng. "sudo airmon-ng start wlan0 (channel)". I'm channel 11. Seen to make a virtual device that is mon0. wlan0 still exists.
https://file.army/i/BY26hYj
Open wireshark "sudo wireshark" and open the capture option on the tab.
https://file.army/i/BY261hk
Select mon0 or wlan0 if it is monitor and start.
https://file.army/i/BY26Msv
Look for PROBE REQUEST packages or similar on other networks. Right-click, copy, bytes, hexstream.
https://file.army/i/BY26QjH
Open the ostinato "sudo ostinato". Click + on the port. Select mon0.
https://file.army/i/BY26A6f
File > port configuration > interleaved stream (to send packets continuously). Right-click on the right screen, add stream. Select the gear for configuration (click 2x). Select advance.
https://file.army/i/BY26C3I
Select hexdump, place it on the right screen and click the button in the middle.
https://file.army/i/BY26pqV
Select the data protocol on the tab. To copy paste a packet from WireShark, press "Ctrl". Add 00000 ... to the size of the package as you wish.
https://file.army/i/BY26Fxp
Choose stream control and per packet / sec shipment size (I am 3000). Click the ok button and if there is anything "yes", then click apply.
https://file.army/i/BY26dpK
Select the port you want to send (I'm port 2, please try) and click start tx (play button).
https://file.army/i/BY26fDD
If it is true on wireshark many packet requests and responses will occur. Other users will see "limited access" alias "!" on the wireless.

Reference

WIRELESS HACKING, Efvy Zam.

Mirror

Comments