deauthentication
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| deauthentication [2008/09/22 18:53] – RC/SVN information darkaudax | deauthentication [2010/11/21 13:34] (current) – typos sleek | ||
|---|---|---|---|
| Line 26: | Line 26: | ||
| First, you determine a client which is currently connected. | First, you determine a client which is currently connected. | ||
| - | aireplay-ng -0 1 -a 00: | + | aireplay-ng -0 1 -a 00: |
| Where: | Where: | ||
| Line 32: | Line 32: | ||
| * 1 is the number of deauths to send (you can send multiple if you wish) | * 1 is the number of deauths to send (you can send multiple if you wish) | ||
| * -a 00: | * -a 00: | ||
| - | * -c 00:0F:B5:34:30:30 is the MAC address of the client you are deauthing | + | * -c 000:0F:B5:AE:CE:9D is the MAC address of the client you are deauthing |
| - | *ath0 is the interface name | + | * ath0 is the interface name |
| - | Here is what the ouput looks like: | + | Here is typical output: |
| + | |||
| + | | ||
| + | | ||
| + | |||
| + | For directed deauthentications, | ||
| + | |||
| + | Here is what the "[ 61|63 ACKs]" means: | ||
| + | |||
| + | * [ ACKs received from the client | ACKs received from the AP ] | ||
| + | * You will notice that the number in the example above is lower then 64 which is the number of packets sent. It is not unusual to lose a few packets. | ||
| + | * How do you use this information? | ||
| + | |||
| - | | ||
| ==== WPA/WPA2 Handshake capture with an Atheros ==== | ==== WPA/WPA2 Handshake capture with an Atheros ==== | ||
| Line 47: | Line 58: | ||
| aircrack-ng -w / | aircrack-ng -w / | ||
| - | Here the explaination | + | Explanation |
| airodump-ng -c 6 --bssid 00: | airodump-ng -c 6 --bssid 00: | ||
| Line 81: | Line 92: | ||
| After sending the ten batches of deauthentication packets, we start listening for ARP requests with attack 3. The -h option is mandatory and has to be the MAC address of an associated client. | After sending the ten batches of deauthentication packets, we start listening for ARP requests with attack 3. The -h option is mandatory and has to be the MAC address of an associated client. | ||
| - | If the driver is [[http:// | + | If the driver is [[http:// |
| ===== Usage Tips ===== | ===== Usage Tips ===== | ||
| Line 105: | Line 116: | ||
| See the general aireplay-ng troubleshooting ideas: [[aireplay-ng# | See the general aireplay-ng troubleshooting ideas: [[aireplay-ng# | ||
| - | |||
| - | |||
| - | ===== Release Candidate or SVN Version Notes ===== | ||
| - | |||
| - | This section ONLY applies the latest SVN version and to some release candidate versions of the aircrack-ng suite. | ||
| - | |||
| - | For directed deauthentications, | ||
| - | |||
| - | Here is a typical command: | ||
| - | |||
| - | aireplay-ng -0 1 -a 00: | ||
| - | |||
| - | Here is typical output: | ||
| - | |||
| - | | ||
| - | | ||
| - | |||
| - | Here is what the "[ 61|63 ACKs]" means: | ||
| - | |||
| - | * [ ACKs received from the client | ACKs received from the AP ] | ||
| - | * You will notice that the number in the example above is lower then 64 which is the number of packets sent. It is not unusual to lose a few packets. | ||
| - | * How do you use this information? | ||
| - | |||
deauthentication.1222102434.txt.gz · Last modified: by darkaudax
