-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Addition of example.md #461
Conversation
Looking good so far, thanks. But the usage of the BPF is misleading. This are simple BPF's
This is a an advanced BPF, because it allows hcxdumptool to interact on BROADCAST MACs. While this BPF is useless:
"not wlan addr3 00c0cab035be" == this MAC will be filtered out and all other MACs are allowed - that include the BROADCAST MAC ffffffffffff - so, no need to add "or wlan addr3 ffffffffffff" Please note: Not merged because usage of the BPF is misleading. BTW: |
Ok, I understand. I'll change the content so it is actually correct. |
Great. After the change I'll merge it.
As your documentation include a basic example, the help menu of hcxdumptool only contain a basic example too. Everything else would blow it up. To code advanced filters, it is absolutely mandatory to understand 802.11 and Bolean Operators. |
Some tools use command line options to filter a BSSID (--bssid=11:22:33:44:55:66). This is the royal class as tshark, Wireshark and tcpdump do it. |
@ZerBea |
Now its fine. Thanks. Merged. |
@ZerBea
Using |
BTW: Correct is "wlan addx" and not "wlan addr x" - that was an ugly copy and paste error. |
I'll open another pull request with fixed BPF syntax. Gimme a few. |
This commit contains a new document that showcases an example attack on a test AP that I own.