The 802.11 standard has a special frame called deauthentication that, as you might expect, deauthenticates everyone on the access point. Our next step is to bump the "neighbor" off his access point. Step 5: Deauthentication or Bumping Him Off Where 00:09:5B:6F:64:1E is the BSSID, Elroy is the SSID, and - c 11 is the channel of the suspect's AP. They've asked us to investigate and determine whether he actually is, and if so, to collect evidence. We've been asked by a client to investigate the possibility that their neighbor is downloading and selling child pornography. ![]() In this scenario, we are a private investigator. This is a powerful client-side hack that will enable us to see all of the traffic from the client and conduct a man-in-the middle attack. ![]() Our aircrack-ng suite has a tool, airbase-ng, that can be used to convert our wireless adapter into an access point. The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth. ![]() Our first task will be to creating an evil twin access point.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |