Description: This video explains about the filter options and replay options provided by the Aireplay NG. Aireplay NG is always used with some attack vector and depending upon the attack, you will be interested in some specific packets only. With the help of filter options you can filter the required packets for re-injection. Similarly, while re-injecting the packets you might have to alter some fields of the fields. With the help of replay options you can change different fields in the packet like frame control word or source, destination and BSSID MAC and so on. <p> Through understanding these options is the key for using the aireplay-NG effectively to crack the WEP key in small amount of time. </p>AireplayNG is a part of AircrackNG suite of products and is used for re-injecting wireless 802.11 frames on to the specified channel. The main aim of aireplay-NG is to generate large amount of traffic so that it can be used later for cracking the WEP or WPA-PSK keys with the help of aircrack-NG. The input to Aireplay-NG will be either the pcap file which needs to be injected or the interface name, as aireplay-NG is even capable of capturing packets on the wireless interface.Links <p> 1. Aireplay-ng Homepage</p> <p> 2. Aireplay-ng Download</p> <p> 3. Aireplay-ng Linux man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.