Raw Fake AP software creates fake Wi-Fi access points by emulating valid IEEE 802.11 networks through the use of wireless raw injection.
One of the key features of "Raw Fake AP" is its ability to inject raw frames in monitor mode. It also tries to forge coherent sequence numbers and BSS timestamps (depending on driver injection capabilities) and have a coherent time interval between beacons, which is often hard to achieve without a real-time kernel.
The command-line interface provides a wide range of options, including randomizing Open/WEP/WPA/RSN crypto, randomizing b/g cards, channel hopping, TXpower hopping, randomizing ESSIDs, BSSIDs, choosing beacon interval, number of fake access points, a file with valid OUIs or ESSIDs, and selecting a destination MAC address.
To run Raw Fake AP, users need a laptop running GNU/Linux, PCMCIA IEEE 802.11 wireless card, and wireless tools (iwconfig) with channel and TXpower support. They also require a raw injection enabled wireless driver, which they can check on Christophe Devine's aircrack webpage for raw injection hints.
This software has been successfully tested on Netgear WG511 (prism54 driver), Netgear WAG511 (madwifi driver), and Netgear MA401 (hostap driver). Prism54 and madwifi drivers enable the tool to inject coherent sequence numbers and BSS timestamps.
To install the software, users can follow the basic steps of typing "make" and "make install" (as root). The latest version added a probe response mode option. In conclusion, the Raw Fake AP provides an excellent tool to help users to simulate potential access points for various purposes, including testing and security.
Version 0.2: N/A