Scenarios Guide

Scenarios are pre-built vulnerable network environments for testing.

How Scenarios Work

When you start a session, the platform spins up a virtualized wireless environment based on your chosen scenario. Your DUT (Device Under Test) is then launched with access to a virtual WiFi adapter that can see and interact with the simulated networks.

๐Ÿ“ก

Virtual Access Points

Each scenario creates multiple simulated APs with different security configurations.

๐Ÿ›ก๏ธ

Realistic Vulnerabilities

Target networks have intentional weaknesses like WPS Pixie Dust, weak passwords, or misconfigurations.

โš™๏ธ

Full Tool Support

Monitor mode, packet injection, and all standard pentesting tools work as expected.

DUT Image Requirements

Your DUT image must be configured to work with the virtual WiFi environment:

Interface Configuration

wlan0Virtual WiFi adapter - supports monitor mode and injection
wlan0monCreated when you run airmon-ng start wlan0
eth0Management interface - do not use for testing

Recommended Tools

aircrack-ng bully reaver wifite hashcat nmap mdk4

Artifact Collection

Write any files you want to retrieve to /results/:

# Save captured handshakes
cp capture.cap /results/

# Save scan results
airodump-ng wlan0mon --write /results/scan

# Save your report
echo "Test passed" > /results/report.txt

Available Scenarios

Network Validator

trivial ~1 min
network-validator

A simple validation scenario for CI/CD pipelines. Creates 4 WiFi networks that the DUT should detect. Perfect for smoke testing wireless functionality.

Tags: ci-cd validation automated

Networks

CI_TestNet_1Open
CI_TestNet_2Open
CI_TestNet_3Open
CI_TestNet_4Open

Vulnerable Home Network

beginner ~15 min
vulnerable-home-network

A realistic home WiFi environment with a vulnerable target network. Test WPA handshake capture, WPS Pixie Dust attacks, and post-exploitation network reconnaissance.

Tags: wifi wps pixie-dust handshake

Networks

Smith_Family_5GWPA2-PSK
NETGEAR-2G-7842WPA2-PSK
Verizon_5G_UltraWPA3-SAE
HomeNetWPA2-PSK + WPSVulnerable

Checkpoints

  • All 4 access points visible
  • Target network identified with WPS
  • WPA handshake captured
  • Password cracked via handshake
  • Pixie Dust attack successful
  • Connected to target network
  • Camera discovered on internal network

Using Scenarios

Via API

curl -X POST https://api.testfirestudio.com/api/v1/tests \
  -H "Authorization: ApiKey arena_..." \
  -H "Content-Type: application/json" \
  -d '{
    "scenario_id": "vulnerable-home-network",
    "image_id": "YOUR_IMAGE_ID"
  }'

Via CLI

arena test --scenario vulnerable-home-network --image ./my-dut.tar.gz

List Available Scenarios

# API
curl https://api.testfirestudio.com/api/v1/scenarios

# CLI
arena scenarios list

Custom Scenarios Enterprise

Enterprise customers can create custom scenarios tailored to their specific testing needs. Custom scenarios support:

Contact us to discuss custom scenarios โ†’

Best Practices

โœ“ Start Simple

Use network-validator first to verify your DUT can see networks before moving to complex scenarios.

โœ“ Check Exit Codes

Exit 0 for pass, non-zero for fail. This enables CI/CD integration.

โœ“ Save Artifacts

Write captures, logs, and reports to /results/ for later analysis.

โœ“ Set Timeouts

Use appropriate timeouts - some attacks can take time.