mac80211-injection.txt 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. How to use packet injection with mac80211
  2. =========================================
  3. mac80211 now allows arbitrary packets to be injected down any Monitor Mode
  4. interface from userland. The packet you inject needs to be composed in the
  5. following format:
  6. [ radiotap header ]
  7. [ ieee80211 header ]
  8. [ payload ]
  9. The radiotap format is discussed in
  10. ./Documentation/networking/radiotap-headers.txt.
  11. Despite many radiotap parameters being currently defined, most only make sense
  12. to appear on received packets. The following information is parsed from the
  13. radiotap headers and used to control injection:
  14. * IEEE80211_RADIOTAP_FLAGS
  15. IEEE80211_RADIOTAP_F_FCS: FCS will be removed and recalculated
  16. IEEE80211_RADIOTAP_F_WEP: frame will be encrypted if key available
  17. IEEE80211_RADIOTAP_F_FRAG: frame will be fragmented if longer than the
  18. current fragmentation threshold.
  19. * IEEE80211_RADIOTAP_TX_FLAGS
  20. IEEE80211_RADIOTAP_F_TX_NOACK: frame should be sent without waiting for
  21. an ACK even if it is a unicast frame
  22. The injection code can also skip all other currently defined radiotap fields
  23. facilitating replay of captured radiotap headers directly.
  24. Here is an example valid radiotap header defining some parameters
  25. 0x00, 0x00, // <-- radiotap version
  26. 0x0b, 0x00, // <- radiotap header length
  27. 0x04, 0x0c, 0x00, 0x00, // <-- bitmap
  28. 0x6c, // <-- rate
  29. 0x0c, //<-- tx power
  30. 0x01 //<-- antenna
  31. The ieee80211 header follows immediately afterwards, looking for example like
  32. this:
  33. 0x08, 0x01, 0x00, 0x00,
  34. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  35. 0x13, 0x22, 0x33, 0x44, 0x55, 0x66,
  36. 0x13, 0x22, 0x33, 0x44, 0x55, 0x66,
  37. 0x10, 0x86
  38. Then lastly there is the payload.
  39. After composing the packet contents, it is sent by send()-ing it to a logical
  40. mac80211 interface that is in Monitor mode. Libpcap can also be used,
  41. (which is easier than doing the work to bind the socket to the right
  42. interface), along the following lines:
  43. ppcap = pcap_open_live(szInterfaceName, 800, 1, 20, szErrbuf);
  44. ...
  45. r = pcap_inject(ppcap, u8aSendBuffer, nLength);
  46. You can also find a link to a complete inject application here:
  47. http://wireless.kernel.org/en/users/Documentation/packetspammer
  48. Andy Green <andy@warmcat.com>