Set the ETHTOOLOPTS parameter in the interface’s ifcfg file found in the /etc/sysconfig/network-scripts/ directory. The network service scripts will run the ethtool program every time the interface is brought up. Ethtool can be invoked multiple times by separating the values with a semicolon: For example, the command. Ethtool Shows Unknown Speed and Duplex (16563881) When ethtool command is used on Oracle VM server, the status 'Unknown!' Is displayed for the Speed and Duplex settings. 以下に、使用頻度の高い Ethtool コマンドとあまり知られていない有用なコマンドを挙げておきます。コマンドの全一覧は、ethtool -h で表示されます。詳細なリストと説明は、man ページ ethtool(8) を参照してください。以下の最初の 2 例は情報クエリで.
Mar 20, 2009 rpm -ql ethtool will tell you that it's installed in /usr/sbin, which is not in the PATH for normal users. Run it using the absolute path, but this will still only allow you to query the device, not set any parameters.
ethtool is a networking utility on Linux. It is used to configure Ethernet devices on Linux. ethtool can also be used to find a lot of information about connected Ethernet devices on your Linux computer.In this article, I will show you how to use ethtool command on Linux. I will be using Debian 9 Stretch for the demonstration. But any modern Linux distribution should work. Let’s get started.
In most cases, ethtool should already be installed on your favorite Linux distribution. You can check whether ethtool is installed already with the following command:
As you can see, ethtool 4.8 is installed on my Debian 9 Stretch machine.
If you see an error, then ethtool may not be installed on your computer. You can install ethtool very easily in your favorite Linux distribution. I will show you how to install ethtool on Ubuntu, Debian, RHEL 7 and CentOS 7 in the next sections of this article below.
Installing ethtool on Ubuntu and Debian:
ethtool is available in the official package repository of Ubuntu and Debian. So it is really easy to install.
First, update the APT package repository cache with the following command:
Now, install ethtool with the following command:
Installing ethtool on CentOS 7 and RHEL 7:
ethtool is available in the official package repository of CentOS 7 and RHEL 7. You can install it very easily.
First, update the YUM cache with the following command:
Finally, install ethtool with the following command:
Displaying Network Interface Card Information with ethtool:
You can display information about the network interface cards (NICs) connected to your computer with ethtool utility. To do that, you need the network interface name of your network interface card (NIC).
On Linux, every network interface card (NIC) is assigned unique names such as eth0, ens32 etc.
First, find the assigned names of all the available network interfaces of your computer, with the following command:
As you can see, I have only two network interface cards (NICs) connected to my computer. If you have more, it should show up here. The assigned names of my network interfaces are ens33 and enx00e04c42a3fe respectively. Yours should be different. But take a note of these as you will need it from now on.
Now, to display more information about a network interface card (let’s say enx00e04c42a3fe) with ethtool, run the following command:
As you can see, a lot of information about the network interface card enx00e04c42a3fe is listed here.
For example, the supported link modes of your NIC is displayed here.
The currently used duplex mode and speed is displayed here as well. As you can see, it is connected in full duplex mode at 100 Mbps speed.
You can also find out whether your NIC supports auto negotiation from here. If auto negotiation is enabled, your NIC picks a random link mode from one of its supported link modes depending on the Router or switch port it’s connected to.
Checking Which Driver your NIC is Using:
You can also check which driver your NIC is using with ethtool command.
For example, to check for the driver used by one of your NIC (let’s say enx00e04c42a3fe), run ethtool command as follows:
As you can see, my enx00e04c42a3fe NIC is using Realtek r8152 driver version 1.08.7. Yours may be different.
Display Network Usage Statistics with ethtool:
You can find out how many packets the NIC sent (Tx or transmitted) and received (Rx or received) using ethtool. You can also find out how many of these packets collided, transmission (Tx) errors and receiver errors (Rx) and many more.
To display your NIC (let’s say enx00e04c42a3fe) statistics, run ethtool as follows:
As you can see, a lot of statistics data on your NIC is displayed.
Making your NIC Blink Using ethtool:
Making your NIC blink may sound useless. But imagine a case where your computer has lots of network interfaces. How would you know which port is assigned what network interface name? Well, just blink each network interface and find out for yourself using ethtool. Simple!
To blink a network interface (let’s say enx00e04c42a3fe) with ethtool, run ethtool as follows:
This feature may not be available on your NIC card. Check the manual of your NIC card for more information on this.
My NIC card do not have this feature, so all I get is an error.
Setting Speed and Modes on NICs Manually:
At times, auto negotiation may fail and your NIC may use the wrong speed and mode. You can easily fix that with ethtool.
First, check what speeds and modes are supported on your NIC (Let’s say enx00e04c42a3fe) with the following command:
You can find the supported link modes of your NIC in the Supported link modes section and your Routers or Switches advertised link modes on Link partner advertised link modes section as you can see in the marked section of the screenshot below. My NIC and Router supports, 10baseT and 100baseT in Half and Full duplex mode.
Currently, my NIC enx00e04c42a3fe is working in Full duplex mode at 100 Mbps speed.
To change it, let’s say in Full duplex mode at 10 Mbps speed, run ethtool as follows:
As you can see, the speed is changed to 10Mbps and the duplex mode is full. Also, auto negotiation is turned off.
Getting Help on ethtool:
The ethtool command has lots of options. It’s not possible to show how every option work in this article due to the scope and hardware limitation of my computer.
But you should be able to find what you need on the manpage of ethtool, which you can access with the following command:
So, that’s how you use ethtool on Linux. Thanks for reading this article.
Introduction
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA cracking tool for 802.11 wireless LANs. Its attack is much faster compared to other WEP cracking tools. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack.
Basically, aircrack-ng represents a complete suite of tools to assess WiFi network security.
Aircrack-ng: WEP and WPA Cracking Tool Suite
Aircrack-ng is suite of tools for manipulating and cracking Wi-Fi networks (WEP and WPA cracking tool). It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. It focuses on different areas of WiFi security:
Monitoring
: Packet capture and export of data to text files for further processing by third party tools.Attacking
: Replay attacks, deauthentication, fake access points and others via packet injection.Testing
: Checking WiFi cards and driver capabilities (capture and injection).Cracking
: WEP and WPA PSK (WPA 1 and 2).
It runs on:
- Linux (packaged for OpenWrt ), Windows, OS X, FreeBSD, OpenBSD, NetBSD, Solaris and even on eComStation 2.
- CPU architectures (x86 and 64 bit, ARM v7, ARM v8, PowerPC, etc).
Features
Aircrack-ng Suite, WEP and WAP cracking tool, has a bunch of new features:
- More cards/drivers supported, more OS and platforms supported, new WEP attack: PTW ,WEP dictionary attack, Fragmentation attack, WPA Migration mode ,Improved cracking speed, capture with multiple cards, optimizations, other improvements and bug fixing and new tools.
Requirements:
- Autoconf, Automake, Libtool, shtool
- OpenSSL development package or libgcrypt development package.
- Airmon-ng (Linux) requires ethtool.
- Windows: cygwin has to be used and it also requires w32api package.
- Windows: if using clang, libiconv and libiconv-devel
- Linux: LibNetlink 1 or 3. It can be disabled by passing –disable-libnl to configure.
- pkg-config (pkgconf on FreeBSD)
- FreeBSD, OpenBSD, NetBSD, Solaris and OS X with macports: gmake
- Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev)
Aircrack-ng Suite includes:
- airbase-ng — Multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself.
- aircrack-ng — 802.11 WEP and WPA/WPA2-PSK key cracking program.
- airdecap-ng — Decrypt WEP/WPA/WPA2 capture files.
- airdecloak-ng — Remove WEP Cloaking™ from a packet capture file.
- airdriver-ng — Script providing information and allowing installation of wireless drivers.
- airdrop-ng — A rule based wireless deauthication tool.
- aireplay-ng — Inject and replay wireless frames.
- airgraph-ng — Graph wireless networks.
- airmon-ng — Enable and disable monitor mode on wireless interfaces.
- airodump-ng — Capture raw 802.11 frames.
- airolib-ng — Precompute WPA/WPA2 passphrases in a database to use it later with aircrack-ng.
- airserv-ng — Wireless card TCP/IP server which allows multiple application to use a wireless card.
- airtun-ng — Virtual tunnel interface creator.
- easside-ng — Auto-magic tool which allows you to communicate to an WEP-encrypted Access Point without knowing the key.
- packetforge-ng — Create various type of encrypted packets that can be used for injection.
- tkiptun-ng — Proof-of-concept implementation the WPA/TKIP attack.
- wesside-ng — Auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes.
- Other Tools (WZCook, ivstools, Versuck-ng, buddy-ng, makeivs-ng, kstats).
Short [Aircrack-ng] tutorial for Windows crowd.
Aircrack-ng Install
To build aircrack-ng
, install the basic requirements.
Debian/Ubuntu:
Fedora/CentOS/RHEL:
For Windows, OS X, FreeBSD check Aircrack-ng GitHub Repository.
Download the latest version (current version 1.3), compile and install:
gmake
instead of make
.When configuring, you can choose ./configure flags
to adjust the suite to your needs. You can find available flags here.
Ethtool For Os Xenoverse
Looking for another password cracker? You may like THC Hydra: Network Logon Cracker.