Sniffing in Monitor mode with airport (OS X 10.6+)
In the old days (Old OSX versions), they used undocumented IOCTLs and modifications to parameters in the kernel module bundles, to be able to set the airport in monitor mode.
In the new versions of OS X, however, Apple introduced a new API for setting the wireless state, that unfortunately, wasn’t entirely reliable until the latest version of Snow Leopard.
So right now, we are able to use mostly any OS X macbook, or iMac, for wireless sniffing in monitor mode in a reliable fashion (there is still no support for injection, though).
However, most of the time I just need to hack something quickly, and implementing an application that uses the same mechanisms as Kismet and KisMAC to be able to sniff packets in monitor mode, is way too cumbersome.
This is where this nifty tool comes in: airport. Let’s start by making a link from the original location, to one in which your shell can find it:
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport
After this, you can sniff any channel in monitor mode, with your airport card:
airport sniff CHANNEL
After executing this command, your wireless card is in monitor mode sniffing the channel you specified. There should be an eye on the airport symbol:
From this moment on, airport will save all the packets seen in specified channel, to a randomly created file in /tmp. The file name has the following template: airportSniffXXXXXX.cap. However, the tool does not give any easy way of accessing the data, since the file is only output when the process is killed.
So what I wanted to do was to use a packet manipulation tool, like scapy, on the data output from airport. However, given that the data is only output from airport when the process exits, this is what I did:
while(True): p = Popen("airport " +"sniff " + channel, shell=True) time.sleep(SLEEP_TIME) Popen("kill -HUP %s" % p.pid, shell=True) doSomething()
This simple python loop calls airport, sleeps for a predetermined amount of time (SLEEP_TIME), and then sends an HUP signal to the airport process (effectively forcing it to create the output file). This is an ugly hack, I know, but it works.
Just one aditional thing, it is probably a good idea to use threads to execute doSomething(), so the loop won’t block while waiting for this function to finish running (avoiding the loss of packets unnecessarily).
To run it, you need to have scapy installed. After that you just run OSx10.6_monitorMode.py, and enjoy the cookies:
python OSx10.6_monitorMode.py CHANNEL
You can get the source code directly from here. The great thing about OSx10.6_monitorMode.py, is that it is independent of the type of card being used. As long as airport sniff works on the system, we are able to use it. We are, thus, letting Apple do all the driver work for us (less probability of this being broken on the next versions of OS X). Neat.
- Card Type: AirPort Extreme (0x14E4, 0x8E)
- Firmware Version: Broadcom BCM43xx 1.0 (220.127.116.11.1)
- OS X 10.6.5
- Card Type: AirPort Extreme (0x168C, 0x8F)
- Firmware Version: Atheros 9280: 18.104.22.168
- OS X 10.6.6
If you test this software, please, send in your setup, so I can add it to the working list. Btw: 2CPZUMZN72ZD.