62 WiFi Hijacking Targeted Packet Sniffing Deauthentication Attack practical Part 7
דרג סרטון זה
התחבר כדי לדרג
תיאור
Deauthentication Attack Airplay-ng In this attack, we disconnect a client from the network, then make it connect to our WiFi. The goal: Obtaining the customer's password to connect to the network. Or planting a backdoor if you impersonate their network! Get the square handshake, and get the login password How does that happen? We impersonate the customer (his physical address) Submit a request to disconnect from the router (so to speak as the client) pretend to be the router (to its physical address) The customer was told that we received their opt-out request. First of all, we will run the network scan command (attack success) airodump-ng --bssid D4:35:10:50:1E:FC --channel 1 wlan0 aireplay-ng --deauth 100000000 -a[Network-MAC] -c[Client-MAC] -D [ only if it's a 5GHz put -D] wlan0