Source — AirSnitch upstream README
File: airsnitch/README.md (upstream).
The user-facing operator’s manual for the AirSnitch tool, maintained by Mathy Vanhoef. Lives at the root of the vanhoefm/airsnitch GitHub repo.
Summary
Operational walkthrough of AirSnitch from prerequisites to per-attack invocation. Sections:
- Introduction. High-level descriptions of the three attack categories (Abusing GTK, Gateway Bouncing, Port Stealing) with the canonical injected-frame examples in Scapy notation. Includes a comparison to MacStealer (USENIX’23) explicitly pointing out which AirSnitch tests are novel relative to that prior work.
- Prerequisites. Ubuntu 22.04.5 LTS recommended. Build dependencies.
setup.sh→airsnitch/research/build.sh→pysetup.sh. - Before every usage. Environment setup,
client.confconfiguration, BSSID selection arguments. - Main vulnerability tests. Per-flag walkthroughs —
--check-gtk-shared,--c2c-ip,--c2c-port-steal,--c2c-port-steal-uplink. Includes the exact “vulnerable” output strings. - Extra vulnerability tests.
--c2c-broadcast, manual tests, BSSID specification. - Defenses and mitigations. The eight-step defensive recommendation set the wiki’s defenses index is built from.
- Troubleshooting. Common environmental issues. Includes the
drop_unicast_in_l2_multicast=0requirement for--c2c-gtk-injecttesting on a Linux machine. - Clarifications. Caveats about how Enterprise AP results in the paper should be interpreted.
Local copy
The README is not duplicated under raw/. Read it directly at vanhoefm/airsnitch/README.md (upstream). It is updated upstream; pull the latest version with git pull inside the airsnitch/ directory.
Pages this source informs
(Every wiki page with sources: [airsnitch-readme] in its frontmatter.)
- overview
- Concepts: client isolation, WPA versions
- Attacks: abusing-gtk, gateway-bouncing, port-stealing, broadcast-reflection
- Defences: index, vlans, filter-unicast-in-broadcast, documentation
- Tools: airsnitch-cli, configurations, repo-layout, setup-scripts
Notable framing choices in the README
A handful of stances the README takes that are worth carrying forward in the wiki:
- “AirSnitch can ‘break’ Wi-Fi encryption” is wrong. The README pushes back on this framing in the introduction. AirSnitch is a key-management/identity-binding attack, not a cipher attack. Wiki pages should follow this framing.
- Switching to WPA3 alone does not stop the attacks. The README is explicit. See WPA versions.
- Most attacks are independent of the encryption protocol. See the matrix in overview.
- Use the tool to test your own network. The README’s intent is operational. The wiki should preserve this — every attack page ends with a “test it on your network” CLI snippet.
Status
The upstream README is more recent than the NDSS’26 artifact-evaluated code; the upstream version contains “various updates” per its banner. When the two disagree, prefer the upstream README for operational questions and the paper for analytical claims.
