airtun-ng
Create virtual tunnel interfaces for encrypted WiFi traffic
TLDR
Create a virtual tunnel interface
SYNOPSIS
airtun-ng [-a bssid] [-w wepkey] [-p wpapass -e essid] [options] interface
DESCRIPTION
airtun-ng creates virtual tunnel interfaces (at0, at1, etc.) that allow sending and receiving decrypted traffic to/from a wireless network. This enables using standard network tools with encrypted WiFi networks when you know the key.
The tool can operate in WEP or WPA mode, creating a virtual ethernet interface that handles encryption/decryption transparently.
PARAMETERS
-a bssid
Access point MAC address-w key
WEP key in hexadecimal-p passphrase
WPA passphrase-e essid
Network name (required for WPA)-t flag
Tunnel type: 0=auto, 1=WDS, 2=normal-r file
Replay packets from capture file-h mac
Source MAC address
CAVEATS
For authorized testing only. Interface must be in monitor mode. WPA mode requires the 4-way handshake to be completed. Virtual interface must be configured (IP, etc.) after creation.
HISTORY
airtun-ng was added to the aircrack-ng suite to enable post-exploitation scenarios where captured keys could be used to interact with the network using standard tools.
SEE ALSO
aircrack-ng(1), airbase-ng(1)
