Blame view

Documentation/networking/mac80211-injection.txt 2.17 KB
08d1f2155   Andy Green   [PATCH] mac80211:...
1
2
3
4
5
6
7
8
9
10
11
12
13
  How to use packet injection with mac80211
  =========================================
  
  mac80211 now allows arbitrary packets to be injected down any Monitor Mode
  interface from userland.  The packet you inject needs to be composed in the
  following format:
  
   [ radiotap header  ]
   [ ieee80211 header ]
   [ payload ]
  
  The radiotap format is discussed in
  ./Documentation/networking/radiotap-headers.txt.
de2b3e864   Johannes Berg   mac80211: update ...
14
  Despite many radiotap parameters being currently defined, most only make sense
58d4185e3   Johannes Berg   [MAC80211]: impro...
15
16
  to appear on received packets.  The following information is parsed from the
  radiotap headers and used to control injection:
08d1f2155   Andy Green   [PATCH] mac80211:...
17

58d4185e3   Johannes Berg   [MAC80211]: impro...
18
19
20
21
22
   * IEEE80211_RADIOTAP_FLAGS
  
     IEEE80211_RADIOTAP_F_FCS: FCS will be removed and recalculated
     IEEE80211_RADIOTAP_F_WEP: frame will be encrypted if key available
     IEEE80211_RADIOTAP_F_FRAG: frame will be fragmented if longer than the
de2b3e864   Johannes Berg   mac80211: update ...
23
  			      current fragmentation threshold.
d9cd48f95   Helmut Schaa   mac80211: Update ...
24
25
26
27
   * IEEE80211_RADIOTAP_TX_FLAGS
  
     IEEE80211_RADIOTAP_F_TX_NOACK: frame should be sent without waiting for
  				  an ACK even if it is a unicast frame
58d4185e3   Johannes Berg   [MAC80211]: impro...
28
29
30
  
  The injection code can also skip all other currently defined radiotap fields
  facilitating replay of captured radiotap headers directly.
08d1f2155   Andy Green   [PATCH] mac80211:...
31

de2b3e864   Johannes Berg   mac80211: update ...
32
  Here is an example valid radiotap header defining some parameters
08d1f2155   Andy Green   [PATCH] mac80211:...
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  
  	0x00, 0x00, // <-- radiotap version
  	0x0b, 0x00, // <- radiotap header length
  	0x04, 0x0c, 0x00, 0x00, // <-- bitmap
  	0x6c, // <-- rate
  	0x0c, //<-- tx power
  	0x01 //<-- antenna
  
  The ieee80211 header follows immediately afterwards, looking for example like
  this:
  
  	0x08, 0x01, 0x00, 0x00,
  	0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  	0x13, 0x22, 0x33, 0x44, 0x55, 0x66,
  	0x13, 0x22, 0x33, 0x44, 0x55, 0x66,
  	0x10, 0x86
  
  Then lastly there is the payload.
  
  After composing the packet contents, it is sent by send()-ing it to a logical
  mac80211 interface that is in Monitor mode.  Libpcap can also be used,
  (which is easier than doing the work to bind the socket to the right
  interface), along the following lines:
  
  	ppcap = pcap_open_live(szInterfaceName, 800, 1, 20, szErrbuf);
  ...
  	r = pcap_inject(ppcap, u8aSendBuffer, nLength);
de2b3e864   Johannes Berg   mac80211: update ...
60
  You can also find a link to a complete inject application here:
08d1f2155   Andy Green   [PATCH] mac80211:...
61

de2b3e864   Johannes Berg   mac80211: update ...
62
  http://wireless.kernel.org/en/users/Documentation/packetspammer
08d1f2155   Andy Green   [PATCH] mac80211:...
63
64
  
  Andy Green <andy@warmcat.com>