We will be using the aireplay-ng tool, which is available in Kali, for this exercise.
Follow the instructions below carefully:
(wlan.bssid == <mac>) && !(wlan.fc.type_subtype == 0x08)
. This will ensure that we only see non-beacon packets for our lab network.aireplay-ng -9 -e
Wireless Lab -a <mac> mon0
on a terminal.aireplay-ng
, which we launched, and others are from the access point Wireless Lab in response to the injected packets.We just successfully injected packets into our test lab network using aireplay-ng. It is important to note that our card injected these arbitrary packets into the network without being actually connected to the access point Wireless Lab.