Airtun-ng Description
Airtun-ng is a virtual tunnel interface creator and is included in the aircrack-ng package. Airtun-ng two basic functions:
- Allow all encrypted traffic to be monitored for wireless Intrusion Detection System (wIDS) purposes
- Inject arbitrary traffic into a network
In order to perform wIDS data gathering, you must have the encryption key and the bssid for the network you wish to monitor.
Source: Airtun-ng Wiki
Airtun-ng Homepage | Kali aircrack-ng Repo
- Author: Thomas d’Otreppe, Original work: Martin Beck
- License: GPLv2
airtun-ng – a virtual tunnel interface creator
root@kali:~# airtun-ng --help
Airtun-ng 1.5.2 - (C) 2006-2018 Thomas d'Otreppe
Original work: Martin Beck
https://www.aircrack-ng.org
usage: airtun-ng <options> <replay interface>
-x nbpps : number of packets per second (default: 100)
-a bssid : set Access Point MAC address
In WDS Mode this sets the Receiver
-i iface : capture packets from this interface
-y file : read PRGA from this file
-w wepkey : use this WEP-KEY to encrypt packets
-p pass : use this WPA passphrase to decrypt packets
(use with -a and -e)
-e essid : target network SSID (use with -p)
-t tods : send frames to AP (1) or to client (0)
or tunnel them into a WDS/Bridge (2)
-r file : read frames out of pcap file
-h MAC : source MAC address
WDS/Bridge Mode options:
-s transmitter : set Transmitter MAC address for WDS Mode
-b : bidirectional mode. This enables communication
in Transmitter's AND Receiver's networks.
Works only if you can see both stations.
Repeater options:
--repeat : activates repeat mode
--bssid <mac> : BSSID to repeat
--netmask <mask> : netmask for BSSID filter
--help : Displays this usage screen
Airtun-ng 1.5.2 - (C) 2006-2018 Thomas d'Otreppe
Original work: Martin Beck
https://www.aircrack-ng.org
usage: airtun-ng <options> <replay interface>
-x nbpps : number of packets per second (default: 100)
-a bssid : set Access Point MAC address
In WDS Mode this sets the Receiver
-i iface : capture packets from this interface
-y file : read PRGA from this file
-w wepkey : use this WEP-KEY to encrypt packets
-p pass : use this WPA passphrase to decrypt packets
(use with -a and -e)
-e essid : target network SSID (use with -p)
-t tods : send frames to AP (1) or to client (0)
or tunnel them into a WDS/Bridge (2)
-r file : read frames out of pcap file
-h MAC : source MAC address
WDS/Bridge Mode options:
-s transmitter : set Transmitter MAC address for WDS Mode
-b : bidirectional mode. This enables communication
in Transmitter's AND Receiver's networks.
Works only if you can see both stations.
Repeater options:
--repeat : activates repeat mode
--bssid <mac> : BSSID to repeat
--netmask <mask> : netmask for BSSID filter
--help : Displays this usage screen
airtun-ng Usage Examples
wIDS
Specify the BSSID of the access point you wish to monitor (-a DE:AD:BE:EF:CA:FE) and its WEP key (-w 1234567890).
root@kali:~# airtun-ng -a DE:AD:BE:EF:CA:FE -w 1234567890 wlan0mon
created tap interface at0
WEP encryption specified. Sending and receiving frames through wlan0mon.
FromDS bit set in all frames.
created tap interface at0
WEP encryption specified. Sending and receiving frames through wlan0mon.
FromDS bit set in all frames.
ALL NEW FOR 2020

Penetration Testing with Kali Linux (PWK)
2X THE CONTENT
33% MORE LAB MACHINES