forked from riverloopsec/killerbee
-
Notifications
You must be signed in to change notification settings - Fork 0
zbcat
Bryan "Crypt0s" Halfpap edited this page Jan 27, 2016
·
2 revisions
zbcat - send / spoof data responses to target nodes on a 802.15.4 PAN
**zbcat** -c [channel] -i [interface] -p [target pan] -d [destination short addr] -s [source short addr] --data [data in hex values (no spaces)] [-a] [-r]
-c / --channel
channel of the killerbee interface
-i / --interface
which killerbee device to use
-p / --panid
PAN id of the target device in hex format (ex: 0xB33F)
-s / --source
Short address of the source (can be spoofed) in hex format (ex: 0xB33F)
-d / --dest
Short address of the target destination in hex (ex: 0xB33F)
-e / --extsource
Not currently used.
--data
Data to send in hex format, no spaces (ex: AABBCCDDEEFF1122334455)
-a / --ack
Require an ack when the node receives the data?
-l / --shortaddress
Not currently used.
-n / --seqnum
Set the sequence number
-r / --respond
Wait for a Data Request packet to come across the wire before sending a data response
--numloops
Number of times to send the data packet to the destination