aireplay-ng --arpreplay waits for ARP packets, captures them and then injects them as it pleases. Assuming the network traffic is encrypted by WEP or whatever how can aireplay-ng identify an ARP packet in the first place? When i look at traffic in Wireshark don't see any evidence of ARP unless i decrypt traffic.
How does aireplay-ng --arpreplay identify an ARP packet when it is encrypted?
889 Views Asked by simon hearn At
1
There are 1 best solutions below
Related Questions in WIRESHARK
- Bulletproof HTTP Monitor for iOS
- Bytes Accessor in Wireshark in c
- HttpWebRequest timing out, but no packets leaving client
- wireshark - install stable and development builds in OS X
- Why Kryonet sending Object take too much network space?
- Find the SYN and ACK flags from the TCP Packets By TCPDUMP
- Wireshark Capture Filter - IPv4 and IPv6
- Receive UDP broadcast packets across subnetworks the way wireshark can do it
- Wireshark / Fiddler not displaying traffic through C# Webclient when using proxy
- Unable to get accurate results from Browserlocation API with curl
- Bridging ethernet traffic between two interfaces (USB-CDC ECM and Ethernet) using an mbed LPC1768
- How the pcap_next_ex() method is filling the pcp_pkthdr structure passing as input at driver level?
- Wireshark dissector that works with tls/ssl
- Decrypt SSL no client certificate in Wireshark Tutorial
- Unrelated packets in TCP communication capturing results
Related Questions in ARP
- pcap_dispatch() always returns 0 on Mac OSX for wifi interface
- Setting ICMP match with POX controller
- How to structure and ARP request packet in C
- At which layer of OSI model an ARP request is made by host computer?
- Java ARP Scanner
- C/PCAP : ARP packet values all 0
- Linux sends a packet from a source IP of one interface but a source MAC of another
- Edit HTTP header prior to forwarding
- Where does the Source MAC comes from before Encapsulating Frames in Layer2?
- Detect ARP poisoning using scapy
- routing captured packets using Jpcap
- Refresh ARP tables programmatically
- arpspoof from LAN to WAN
- ARP table Flag field in hotspot
- Listen to ARP broadcast in Java
Related Questions in WIFI
- Android check WIFI status (disconnected or user changed WIFI)
- Can i send data through wifi while on another connection
- Find all/particular SSID
- Async HTTP Request and Arduino
- Using scapy with wifi
- Detecting wirless network status change in .NET
- Wifi ESP8266 between to micros
- Data Transfer between iOS and PC over WiFi
- How can i programatically switch my wifi to wifi Printer for printing in iOS
- What is the easiest way to check the network speed in android on both mobile and wifi connection?
- Accept any Wi-Fi password on OpenWRT (hostap)
- OS X Server kills WiFi connection
- Connect multiple devices in GoPro network
- Transfer Data over wifi in android between server and clients
- SCAPY PYTHON - Get 802.11 DS Status
Related Questions in AIRCRACK-NG
- Airmon-ng on Termux(Android)
- bash until loop true when condition returns anything
- Authenticating Client to fake WPA AP without valid PMK?
- airmon-ng not working in terminal (command not found)
- Find wifi enabled devices [stations] around
- Preceding zeros are ignored
- Errors occuring when make-ing Aircrack-ng on raspberry pi
- Studying WEP wireless hacking
- Bash script for reaver to unlock wps-locked status
- Can aircrack-ng and MITMf work together with an Evil Twin attack?
- Airodump not writing handshake to file
- python subprocess cannot read output of airodump-nd mon0
- airodump-ng output with python subprocess.Popen coummunicate method
- How does aireplay-ng --arpreplay identify an ARP packet when it is encrypted?
- How to stop airodump-ng subprocess in Python?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
WEP CRACKING
Weak IVs : Weak Ivs are ivs which reveal information about the wep key itself
RC4 in its implementation in WEP has been found to have weak keys. Having a weak key means that there is more correlation between the key and the output than there should be for good security. Determining which packets were encrypted with weak keys is easy because the first three bytes of the key are taken from the IV that is sent unencrypted in each packet. This weakness can be exploited by a passive attack. All the attacker needs to do is be within a hundred feet or so of the AP.
Out of the 16 million IV values available, about 9000 are interesting to the most popular attack tool, meaning they indicate the presence of weak keys. The attacker captures “interesting packets”, filtering for IVs that suggest weak keys. After that attacker gathers enough interesting packets, he analyzes them and only has to try a small number of keys to gain access to the network. Because all of the original IP packets start with a known value, it’s easy to know when you have the right key. To determine a 104 bit WEP key, you have to capture between 2000 and 4000 interesting packets. On a fairly busy network that generates one million packets per day, a few hundred interesting packets might be captured. That would mean that a week or two of capturing would be required to determine the key
now lets come to your question
how can aireplay-ng identify an ARP packet ?
yes the packets are encrypted but ARP request packets are always of fixed size 28 bytes , so by looking at DOT11 frame header having broadcast address and payload of fixed size arp requests are detected
Hope you got what you were looking for