We will be using the aireplay-ng tool, which is available in Kali, for this exercise.
Follow the instructions below carefully:
In order to do an injection test, first start Wireshark and the filter expression
(wlan.bssid == <mac>) && !(wlan.fc.type_subtype == 0x08)
. This will ensure that we only see non-beacon packets for our lab network.Now run the following command
aireplay-ng -9 -e
Wireless Lab-a <mac> mon0
on a terminal.Go back to Wireshark and you should see a lot of packets on the screen now. Some of these packets have been sent by
aireplay-ng
, which we launched, and others are from the access point Wireless Lab in response to the injected packets.
We just successfully injected packets into our test lab network using aireplay-ng. It is important to note that our card injected these arbitrary packets into the network without being actually connected to the access point Wireless Lab.