• Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Facebook Twitter Instagram
Trending
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
  • Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network
  • Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning
Facebook Twitter YouTube Tumblr Instagram Pinterest
Hacking Tutorials
  • Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Hacking Tutorials
You are at:Home » Wifi Hacking Tutorials » Wifi adapter packet injection test
artwork-wifi adapter packet injection test

Wifi adapter packet injection test

10
By Hacking Tutorials on August 29, 2015 Wifi Hacking Tutorials

Questions about if a certain Wifi adapter is compatible with the Aircrack-ng suite or what Wifi card is capable of packet injection and operating monitoring mode are commonly asked at discussion boards and social media. A Wifi adapter that is capable of packet injection and monitoring mode is trivial and important functionality to be successful in Wifi hacking. Wireless packet injection is spoofing packets on a network to appear as if they are part of the regular network communication stream. Packet injection allows to intercept, disrupt and manipulate network communication. An example of this is sending a deauthentication message from an unknown party outside the network to a connected client as if it was send by the wireless router. This will result in the client disconnecting from the router. Monitoring mode is one of the six modes a Wifi card can operate in which allows you to capture network packets without having to associate with the access point.

If you are looking to buy a Wifi card which is capable of packet injection using the Aircrack-NG suite you can have a look at the following list with supported Wifi adapters:

http://www.aircrack-ng.org/doku.php?id=compatible_cards

Wifi adapter packet injection test

Performing an Wifi adapter packet injection test to see whether your Wifi adapter is capable of injection can be done easily with Aireplay-ng. Aireplay-ng is great tool to generate traffic for cracking WEP and WPA keys. Another great feature is the Deauthentication option which we have used a lot through the Wifi hacking tutorials like:

  • How to hack UPC wireless networks and other WLAN pt 1
  • How to hack a TP link WR841N router wireless network

First we need to put the Wifi adapter in Monitoring mode using the following command:

airmon-ng start wlan0

For anyone getting errors in Kali Linux 2.0: read this post

If necessary kill the processes Kali is complaining about:
Kali Linux Airmon-ng

Testing if your Wifi adapter support packet injection can be done using the following command:

aireplay-ng –test wlan0mon

Packet Injection is working for this card!

Wifi adapter packet injection-2

In Kali Linux ‘iwconfig’ will show you the operating mode of your Wifi card:

Wifi adapter packet injection-1

Wifi adapter packet injection video tutorial

Thanks for watching and please subscribe to our YouTube channel for more hacking tutorials :)

Wireless Hacking Banner
Virtual Hacking Labs - Penetration testing lab

Share on:

  • Email
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow to disable Wi-Fi Sense on Windows 10
Next Article Websploit Wifi Jammer

Related Posts

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

Installing Rogue-jndi on Kali Linux

Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network

10 Comments

  1. Ste Ball on May 30, 2016 10:17 pm

    When I run the test I’m getting ;

    Invalid tods filter. [0,1]

    Is this the tell tale sign that my card is unsupported?

    Reply
    • Drukpa on January 28, 2017 10:03 am

      Use aireplay-ng –test wlan0mon

      Reply
      • Drukpa on January 28, 2017 10:05 am

        Sorry I mean use:

        aireplay-ng –test wlan0mon

        Reply
        • Drukpa on January 28, 2017 10:06 am

          “–test” not “-test”

          Reply
          • mike on April 18, 2018 2:37 am

            what is the difference between those two? because i see the same thing -test

          • Hacking Tutorials on April 18, 2018 9:08 am

            One is with a single dash and the other is with double dash but WordPress formatting automatically converts a double dash to a single dash.

  2. ff on June 22, 2017 9:59 am

    Hi,

    If I have that, I can’t do injection and crack wifi, isn’t it ? :(

    root@parrot:~# airmon-ng start wlan0

    PHY Interface Driver Chipset

    phy0 wlan0mon iwlwifi Intel Corporation Wireless 7265 (rev 59)

    root@parrot:~# aireplay-ng –test wlan0mon
    09:51:38 Trying broadcast probe requests…
    09:51:40 No Answer…
    09:51:40 Found 0 APs

    Thank you

    regards

    Reply
    • Mir Rahed Uddin on September 30, 2018 3:01 pm

      Same problem . my Wi-Fi driver Qualcomm Atheros QCA9377 .when I try aireplay-ng –test wlp1s0 it gives no answer found 0 APs

      Reply
  3. wiki on July 1, 2018 12:49 pm

    When i try it give No answer
    That mean my card is not injectable. plz tell me

    Reply
  4. john on October 4, 2020 9:38 am

    very informative, i appreciate your patients.It must be very difficult for a man of your vast knowledge to break down the information so students such as i, a mere mortal can understand. who would of ever thought that the word processor would change a double hyphen back to a single.so much to learn and as a mortal i only have a lifetime to learn it.

    Reply

Leave A Reply Cancel Reply

Top Tutorials
By Hacking TutorialsOctober 29, 20220

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

By Hacking TutorialsJanuary 10, 20220

Installing Rogue-jndi on Kali Linux

By Hacking TutorialsDecember 17, 20210

Log4Shell VMware vCenter Server (CVE-2021-44228)

By Hacking TutorialsSeptember 27, 20210

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

By Hacking TutorialsFebruary 4, 20200

CVE-2019-19781: Citrix ADC RCE vulnerability

By Hacking TutorialsNovember 1, 20188

Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations

Subscribe

Enter your email address to subscribe to Hacking Tutorials and receive notifications of new tutorials by email.

Join 828 other subscribers
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
Virtual Hacking Labs
Penetration Testin Course and Hacking Labs
Categories
  • Digital Forensics
  • Exploit tutorials
  • General Tutorials
  • Hacking Books
  • Hacking Courses
  • Malware Analysis Tutorials
  • Metasploit Tutorials
  • Networking
  • Pentesting Exchange
  • Scanning Tutorials
  • Web Applications
  • Wifi Hacking Tutorials
Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
Popular Tutorials
By Hacking TutorialsSeptember 1, 2016115

Review: Offensive Security Certified Professional (OSCP)

By Hacking TutorialsApril 18, 201738

Exploiting Eternalblue for shell with Empire & Msfconsole

By Hacking TutorialsMarch 17, 201637

Installing VPN on Kali Linux 2016 Rolling

Featured Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
© Hacking Tutorials 2022

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version