Warmcat homepage andy@warmcat.com
libwebsockets
{"schema":"libjg2-1", "vpath":"/git/", "avatar":"/git/avatar/", "alang":"", "gen_ut":1711657394, "reponame":"packetspammer", "desc":"Linux 80211 monitor mode writing test app", "owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/packetspammer", "f":3, "items": [ { "schema":"libjg2-1", "oid":{ "oid": "715f898b7731da5e5f3508504bb9d271199d6f71", "alias": [ "refs/heads/master"]},"tree": [ { "name": "Makefile","mode": "33188", "size":379}, { "name": "README","mode": "33188", "size":1360}, { "name": "ieee80211_radiotap.h","mode": "33188", "size":9796}, { "name": "packetspammer.c","mode": "33188", "size":9102}, { "name": "packetspammer.h","mode": "33188", "size":624}, { "name": "radiotap.c","mode": "33188", "size":7594}, { "name": "radiotap.h","mode": "33188", "size":1190}],"s":{"c":1711657394,"u": 452}} ,{"schema":"libjg2-1", "cid":"24eeb9e2bf8694f7995d08514079459f", "oid":{ "oid": "715f898b7731da5e5f3508504bb9d271199d6f71", "alias": [ "refs/heads/master"]},"blobname": "README", "blob": "Packetspammer\nAndy Green \u003candy@warmcat.com\u003e\n\nPacketspammer sends unencrypted broadcast packets down a mac80211 wireless\ninterface that should be set for Monitor mode. It spams the packets down the\ninterface as fast as it can, although you can specify a delay between packets.\n\nAt the same time it is listening for packets with a MAC of 13:22:33:44:xx:xx\nand will display metadata about any incoming packets (like the bitrate) and\nthe packet contents. So if you run packetspammer on two nearby machines, they\nwill show each other's packets like this:\n\nRX: Rate: 54.0Mbps, Freq: 2.417GHz, Ant: 0, Flags: 10\n0000: 50 61 63 6B 65 74 73 70 61 6D 6D 65 72 20 2D 2D Packetspammer --\n0010: 62 72 6F 61 64 63 61 73 74 20 70 61 63 6B 65 74 broadcast packet\n0020: 23 34 37 39 31 36 20 2D 2D 20 3A 2D 44 20 2D 2D #47916 -- :-D --\n0030: 75 6C 74 72 61 63 61 74 2E 68 6F 6D 65 2E 77 61 ultracat.home.wa\n0040: 72 6D 63 61 74 2E 63 6F 6D rmcat.com\n\n\nTypical usage:\n\n echo -n mon0 \u003e /sys/class/ieee80211/phy0/add_iface\n iwconfig mon0 mode monitor\n ifconfig mon0 up\n packetspammer mon0\n\nYou may need to bring up your normal interface first and set its channel, eg\n\nifconfig wlan0 up\niwconfig wlan0 channel 2\n\nIf you normal interface is associated to an AP on a particular channel, that's\nfine, the packet injection won't disturb the association.\n","s":{"c":1711657394,"u": 83}} ],"g": 1428,"chitpc": 0,"ehitpc": 0,"indexed":0 , "ab": 1, "si": 0, "db":0, "di":1, "sat":0, "lfc": "0000"}