Low Profile Wireless USB Adapter for Kali Linux

I downloaded Kali Linux yesterday to learn Linux and some security stuff. I also pickup two USB wireless adapters for my wireless testing in my lab. I did purchase an Alfa USB adapter, but it is too bulky, so I got me some Panda PAU03 and PAU05 low profile USB wireless card. These USB adapters are pretty cheap. I got the PAU03 for $9.99 and the PAU05 for $15.99.

Anyways, I need to know if these adapters are compatible with Kali Linux. Once I plugged them in, Kali recognized both adapters right out of the box.

root@kali:~# lsusb
Bus 002 Device 003: ID 148f:5372 Ralink Technology, Corp. 
Bus 002 Device 002: ID 148f:5370 Ralink Technology, Corp. RT5370 Wireless Adapter
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 001 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
root@kali:~#

To test if the USB adapters are able to do a packet injection, do the following:
Note: PAU03 is wlan0 and PAU05 is wlan1.

root@kali:~# airmon-ng 
PHY Interface Driver Chipset
phy0 wlan0 rt2800usb Ralink Technology, Corp. RT5370
phy1 wlan1 rt2800usb Ralink Technology, Corp.

Put these USB adapters into monitor mode

root@kali:~# airmon-ng start wlan0
Found 4 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!

 PID Name
 3116 NetworkManager
 3551 wpa_supplicant
 3600 dhclient
 4017 dhclient

PHY Interface Driver Chipset
phy0 wlan0 rt2800usb Ralink Technology, Corp. RT5370
 (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
 (mac80211 station mode vif disabled for [phy0]wlan0)

phy1 wlan1 rt2800usb Ralink Technology, Corp. 

root@kali:~# airmon-ng start wlan1
Found 4 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!

 PID Name
 3116 NetworkManager
 3551 wpa_supplicant
 3600 dhclient
 4017 dhclient

PHY Interface Driver Chipset

phy0 wlan0mon rt2800usb Ralink Technology, Corp. RT5370
phy1 wlan1 rt2800usb Ralink Technology, Corp. 
 (mac80211 monitor mode vif enabled for [phy1]wlan1 on [phy1]wlan1mon)
 (mac80211 station mode vif disabled for [phy1]wlan1)

And then verify if they are in monitor mode.

root@kali:~# airmon-ng 
PHY Interface Driver Chipset

phy0 wlan0mon rt2800usb Ralink Technology, Corp. RT5370
phy1 wlan1mon rt2800usb Ralink Technology, Corp.

Put the USB adapters in the same channel as your test access points

root@kali:~# iwconfig wlan0mon channel 1
root@kali:~# iwconfig wlan1mon channel 1

If you did not set the channel, the packet injection test may fail as shown below.

root@kali:~# aireplay-ng -9 -e ND-Guest -a D0:C7:89:0B:7F:2B wlan0mon
19:54:29 Waiting for beacon frame (BSSID: D0:C7:89:0B:7F:2B) on channel 4
19:54:39 No such BSSID available.

Now, to test if these cards are able to inject packets do the following commands.

root@kali:~# aireplay-ng -9 -e ND-Guest -a D0:C7:89:0B:7F:2B wlan0mon
19:57:14 Waiting for beacon frame (BSSID: D0:C7:89:0B:7F:2B) on channel 1
19:57:14 Trying broadcast probe requests...
19:57:14 Injection is working!
19:57:15 Found 1 AP 

19:57:15 Trying directed probe requests...
19:57:15 D0:C7:89:0B:7F:2B - channel: 1 - 'ND-Guest'
19:57:16 Ping (min/avg/max): 0.895ms/3.795ms/7.953ms Power: -50.27
19:57:16 30/30: 100%

root@kali:~# aireplay-ng -9 -e ND-Guest -a D0:C7:89:0B:7F:2B wlan1mon
20:00:19 Waiting for beacon frame (BSSID: D0:C7:89:0B:7F:2B) on channel 1
20:00:19 Trying broadcast probe requests...
20:00:20 Injection is working!
20:00:21 Found 1 AP 

20:00:21 Trying directed probe requests...
20:00:21 D0:C7:89:0B:7F:2B - channel: 1 - 'ND-Guest'
20:00:21 Ping (min/avg/max): 1.143ms/3.734ms/8.264ms Power: -50.07
20:00:21 30/30: 100%

The option -9 is packet inject test
The option -e is the ESSID
The option -a is the BSSID
aireplay-ng -9 -a

Hope this would help.

Advertisements

About networkshinobi

This blog is about the things I learned about computers and networking to help me to remember them as I push further my studies. I created this blog to help myself to continue my education; and if you find this blog helpful for your studies, that is great. That is one of the reasons why I made this blog, to share my interest and knowledge. Also, all the entries/posts I made are based on my views, opinion and for educational purposes only. If you see some mistakes, feel free to drop some comments. I would appreciate all the helpful comments. Thanks BTC: 14wVPFBWNAKmfNsgUrPpw8EytkXFLjxYoU ETH: 0x8528793dF77a57186f5B15dA6DC1eaA3c5e92c4a LTC : LMpW2rGYnYdUwvnHA4huB6TGcPEEc1JzXw
This entry was posted in CCNA Wireless, Misc., Security, Wireless and tagged , , , , . Bookmark the permalink.

6 Responses to Low Profile Wireless USB Adapter for Kali Linux

  1. billy says:

    Thanks! Fifteen stars for testing and POSTING! 🙂

  2. Thankful Reader says:

    A million more stars for testing these and showing they work!

  3. Isaac Núñez says:

    So according to your tests the Panda PAU05 supports packet injection and monitor mode?

  4. Mayukh Nandi says:

    Thanks a lot for the above tested results, it was of immense help to me as for choosing the right wifi adapter for me 🙂

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s