We are Ella Sheory and Shaked Nissanov, Software Engineering students from the Technion. This fuzzer and tests were created as a part of a project in computer security.
- Database contains recording of experiments and the relevant information about each one.
- WifiFuzzer contains the code of tool that we used to test various experiments.
Our main and only real library is scapy. We used it to sniff packets and send new ones to simulate a network.
- Connect the monitor device (in our case an ALFA device) and connect it to the Kali machine.
- Open a terminal and write the following:
ifconfig
- check the last device that was added, if you have no other devices it will be wlan0.airmon-ng start wlan0
- this command turns on monitor mode. Change wlan0 to your result from the the previous bullet.airodump-ng -i wlan0
- listen using the monitor device to see your fuzzing target's mac address.python3 wifiFuzzer.py --help
to get information about the possible command line arguments.
- To filter by frame type use:
Beacon:
wlan.fc.type_subtype = 8
Probe response:wlan.fc.type_subtype = 5
Probe request:wlan.fc.type_subtype = 4
- To view a specific channel on the interface open view, then wireless toolbar, then pick the preferred channel in opened row.