You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Berkeley Packet Filter (BPF) is a network tap and packet filter which permits computer network packets to be captured and filtered at the operating system level. Main purpose is to filter a goal to be protected or a goal to be attacked. Unwanted frames can be filtered, too. https://en.wikipedia.org/wiki/Berkeley_Packet_Filter
The filter syntax is similar to the filter syntax of tshark and Wireshark or tcpdump. $ man pcap-filter https://tshark.dev/capture/capture_filters/
To protect a station [AP(s) and/or CLIENT(s)] or to attack a station [APs and/or CLIENT(s)] it is mandatory to create a BPF and to apply it to hcxdumptool. The work flow is to build the BPF is always the same:
Step1:
write filter code in high level syntax (same syntax like the capture filters of tshark, Wireshark and tcpdump)
Step 2:
compile the filter code (either use hcxdumptool's build in BPF compiler or use tcpdump's filter compiler as mentioned in -h and --help
Step 3:
apply filter to hcxdumptool (--bpf=)
To create a BPF it is mandatory to understand 802.11 protocol (frame types and address fields) and is mandatory to analyze the traffic to get all the necessary information to create it.
A BPF is merciless and wrong filter options cause that hcxdumptool does not work as expected.
A BPF is not comparable to aircrack-ng BSSID options.
high level syntax (limited instruction set, but user friendly, simple and easy to use if you are familiar with tshark, Wireshark or tcpdump):
"wlan addr3 112233445566"
c style syntax (unlimited instruction set, good knowledge in programming with C is mandatory):
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
The Berkeley Packet Filter (BPF) is a network tap and packet filter which permits computer network packets to be captured and filtered at the operating system level. Main purpose is to filter a goal to be protected or a goal to be attacked. Unwanted frames can be filtered, too.
https://en.wikipedia.org/wiki/Berkeley_Packet_Filter
The filter syntax is similar to the filter syntax of tshark and Wireshark or tcpdump.
$ man pcap-filter
https://tshark.dev/capture/capture_filters/
To protect a station [AP(s) and/or CLIENT(s)] or to attack a station [APs and/or CLIENT(s)] it is mandatory to create a BPF and to apply it to hcxdumptool. The work flow is to build the BPF is always the same:
To create a BPF it is mandatory to understand 802.11 protocol (frame types and address fields) and is mandatory to analyze the traffic to get all the necessary information to create it.
A BPF is merciless and wrong filter options cause that hcxdumptool does not work as expected.
A BPF is not comparable to aircrack-ng BSSID options.
high level syntax (limited instruction set, but user friendly, simple and easy to use if you are familiar with tshark, Wireshark or tcpdump):
c style syntax (unlimited instruction set, good knowledge in programming with C is mandatory):
low level assembler code (unlimited instruction set, extensive knowledge in programming with ASM is mandatory):
This is the royal class of creating a BPF.
Beta Was this translation helpful? Give feedback.
All reactions