Skip to content

NXNJZ

Linux and Security

  • BLOG
  • Cowsay Fortune
  • Contact
  • Gitlab

Increase the transmission power of a wifi card/adapter (txpower.)

Posted on June 22, 2018 - June 25, 2018 by nxnjz

Introduction

This tutorial will take you through some simple steps to increase the transmission power (txpower) of a wireless card.

This is not necessary for hacking wifi, but will usually increase your success rate, especially for targets that are far from you.

802.11 transmission powers are regulated in almost all countries. Following this tutorial may cause you to go over these regulations.

 

Requirements

  • Linux
  • A compatible wireless card with compatible drivers. Not all cards allow for higher transmission power.
  • Basic command-line knowledge.
  • Tools (installed by default on kali and many distros)
    1. iw
    2. iwconfig
    3. ifconfig

 

Steps

1. Make sure you card is plugged in and working. You may run the following in a terminal to check:

iwconfig

You should see something like this:

 

My interface happens to be wlan1. Yours could be wlan0 or something else.

Look at the third line, Tx-Power=18 dBm, this is what we want to increase.

 

2. Next, we need to set the regulatory domain to one that allows higher transmission powers. On my system, ‘US‘ allows me to go up to 30 dBm. If it doesn’t work for you, try ‘BO‘ instead:

iw reg set US

or

iw reg set BO

 

3. Now run:  iw reg get

 

(2402 - 2472 @ 40), (N/A, 30), (N/A)  This line indicates that we can now go up to 30 dBm on 2.4Ghz channels.

 

4. Now take the interface down with ifconfig:

ifconfig wlan1 down

You should get no output, unless errors occured.

 

5. Set the txpower:

iwconfig wlan1 txpower 30

You should get no output.

 

6. Bring the interface up:

ifconfig wlan1 up

Again, no output.

 

7. Run iwconfig again to make sure everything worked:

 

As you can see, Tx-Power=30 dBm

Posted in WifiTagged 802.11, ifconfig, iw, iwconfig, txpower, wifi, wireless

Post navigation

Wifi
Information Gathering and Exploit Finding with Reconnoitre and Exploit-DB

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • How to Set Up an Interactive SSH Honeypot on CentOS 8.
  • HackTheBox.eu Jarvis Writeup
  • How to setup a simple proxy server with tinyproxy (Debian 10 Buster)
  • How to Install qdPM 9.1 on Debian 10 LEMP
  • How to Install qdPM 9.1 on CentOS 7.

Tags

802.11 apache asp aspx backdoor capture the flag centos crm ctf debian exploits fingerprinting getcap hashes ifconfig information gathering iw iwconfig linux mariadb md5 nginx nmap password pastebin php practice privatebin privesc project management recon reconnoitre scanning shell sqli ssh txpower ubuntu wallabag web webshells wifi wireless xml xxe

Categories

  • BASH (1)
  • CTF/Labs (2)
  • Information Gathering (1)
  • Linux (25)
  • Password Cracking (1)
  • Privilege Escalation (2)
  • SQL Injection (1)
  • Web-Shells (1)
  • Wifi (2)
  • XXE (1)

Recent Comments

  • Christian Mora on Installing Ampache on CentOS 7.
  • Mike on How to Install PrivateBin on Debian 9.
  • Writeup: HackTheBox Cap - Without Metasploit (OSCP Prep) - Learn from Tutorial - Abu Sayed on An Interesting Privilege Escalation vector (getcap/setcap)
  • JD on How to Install SuiteCRM on Debian 10 Buster
  • B1gD4Ddy on An Interesting Privilege Escalation vector (getcap/setcap)