O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step four – replay that traffic

What we need to do to speed up this process is to generate a lot of traffic in a very short period of time. To do this, we are going to perform a process known as packet injection and we are also going to spoof a MAC address in order to induce a wave of traffic that we can in turn capture.

There are many different ways to perform replays of traffic, and in fact this technique is used to replay authentication traffic and other types of traffic on a network between host or applications. Keep in mind, however, that some types of traffic cannot be replayed easily, or at all. In fact, one of the biggest items that will thwart a data replay attack is time stamping, which includes information on a packet telling it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required