Get 80 0FP0EXP Token to input your own list (json format) or insert json link:

JSON Ready: Not Ready

Ready State:

Network State:

Name:

Album:

Reference:



Denial of Service (DOS) on Wifi using Ostinato Linux

Get 60 0FP0EXP Token to remove widget entirely!

source code



source code
old source code

get any 0FP0EXP Token to automatically turn off or 10 0FP0EXP Token to remove this JavaScript Mining.

Get 50 0FP0EXP Token to remove my NFTS advertisements!

Get 40 0FP0EXP Token to remove this donation notification!

get 30 0FP0EXP Token to remove this paypal donation.

View My Stats

get 20 0FP0EXP Token to remove my personal ADS.

word number: 409

Time: 2023-06-09 04:46:43 +0000

I will create a separate software installation page.

Install Ostinato packet generator and all updates: http://software.opensuse.org /download.html?project=home:pstavirs:ostinato&package=ostinato

I use Ubuntu 12.04 LTS

_

sudo echo ‘deb http://download.opensuse.org/repositories/home:pstavirs:ostinato/xUbuntu_12.04/ /’ » /etc/apt/sources.list

sudo apt-get update

sudo apt-get install ostinato

_

Install wifi-radar, airmon-ng or aircrack, and wireshark.

https://file.army/i/BY26GDl

Open wifi-radar and check the wifi you want to test. Here my wifi sensor.

For the wireless adapter to be monitored:

_

sudo ifconfig wlan0 is down

sudo iwconfig wlan0 monitor mode

sudo ifconfig wlan0 up

_

If you do this, you cannot connect to the hotspot. To restore as before, do the above but “sudo iwconfig wlan0 managed mode”.

https://file.army/i/BY26lCs

I do something else because I want to use the internet, which is using airmon-ng. “sudo airmon-ng start wlan0 (channel)”. I’m channel 11. Seen to make a virtual device that is mon0. wlan0 still exists.

https://file.army/i/BY26hYj

Open wireshark “sudo wireshark” and open the capture option on the tab.

https://file.army/i/BY261hk

Select mon0 or wlan0 if it is monitor and start.

https://file.army/i/BY26Msv

Look for PROBE REQUEST packages or similar on other networks. Right-click, copy, bytes, hexstream.

https://file.army/i/BY26QjH

Open the ostinato “sudo ostinato”. Click + on the port. Select mon0.

https://file.army/i/BY26A6f

File > port configuration > interleaved stream (to send packets continuously). Right-click on the right screen, add stream. Select the gear for configuration (click 2x). Select advance.

https://file.army/i/BY26C3I

Select hexdump, place it on the right screen and click the button in the middle.

https://file.army/i/BY26pqV

Select the data protocol on the tab. To copy paste a packet from WireShark, press “Ctrl”. Add 00000 … to the size of the package as you wish.

https://file.army/i/BY26Fxp

Choose stream control and per packet / sec shipment size (I am 3000). Click the ok button and if there is anything “yes”, then click apply.

https://file.army/i/BY26dpK

Select the port you want to send (I’m port 2, please try) and click start tx (play button).

https://file.army/i/BY26fDD

If it is true on wireshark many packet requests and responses will occur. Other users will see “limited access” alias “!” on the wireless.

Reference

WIRELESS HACKING, Efvy Zam.

Mirror