Home Return

Denial of Service (DOS) on Wifi using Ostinato Linux

cv publish0x hive steemit uptrennd https://lbry.tv/$/invite/@0fajarpurnama0:e https://bittube.app/?ref?2JY4FE0CP youtube viewly twitch bitchute dlive dtube portal twitter facebook instagram lindked discord reddit vk pininterest socialeaglerockglobal minds medium blogger weebly wix joomla thumblr

source code

View My Stats

word number: 409

Time: 2021-03-01 14:29:27 +0000

I will create a separate software installation page.

Install Ostinato packet generator and all updates: http://software.opensuse.org /download.html?project=home:pstavirs:ostinato&package=ostinato

I use Ubuntu 12.04 LTS

_

sudo echo ‘deb http://download.opensuse.org/repositories/home:pstavirs:ostinato/xUbuntu_12.04/ /’ » /etc/apt/sources.list

sudo apt-get update

sudo apt-get install ostinato

_

Install wifi-radar, airmon-ng or aircrack, and wireshark.

https://file.army/i/BY26GDl

Open wifi-radar and check the wifi you want to test. Here my wifi sensor.

For the wireless adapter to be monitored:

_

sudo ifconfig wlan0 is down

sudo iwconfig wlan0 monitor mode

sudo ifconfig wlan0 up

_

If you do this, you cannot connect to the hotspot. To restore as before, do the above but “sudo iwconfig wlan0 managed mode”.

https://file.army/i/BY26lCs

I do something else because I want to use the internet, which is using airmon-ng. “sudo airmon-ng start wlan0 (channel)”. I’m channel 11. Seen to make a virtual device that is mon0. wlan0 still exists.

https://file.army/i/BY26hYj

Open wireshark “sudo wireshark” and open the capture option on the tab.

https://file.army/i/BY261hk

Select mon0 or wlan0 if it is monitor and start.

https://file.army/i/BY26Msv

Look for PROBE REQUEST packages or similar on other networks. Right-click, copy, bytes, hexstream.

https://file.army/i/BY26QjH

Open the ostinato “sudo ostinato”. Click + on the port. Select mon0.

https://file.army/i/BY26A6f

File > port configuration > interleaved stream (to send packets continuously). Right-click on the right screen, add stream. Select the gear for configuration (click 2x). Select advance.

https://file.army/i/BY26C3I

Select hexdump, place it on the right screen and click the button in the middle.

https://file.army/i/BY26pqV

Select the data protocol on the tab. To copy paste a packet from WireShark, press “Ctrl”. Add 00000 … to the size of the package as you wish.

https://file.army/i/BY26Fxp

Choose stream control and per packet / sec shipment size (I am 3000). Click the ok button and if there is anything “yes”, then click apply.

https://file.army/i/BY26dpK

Select the port you want to send (I’m port 2, please try) and click start tx (play button).

https://file.army/i/BY26fDD

If it is true on wireshark many packet requests and responses will occur. Other users will see “limited access” alias “!” on the wireless.

Reference

WIRELESS HACKING, Efvy Zam.

Mirror