O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Phase four – performing a fake authentication

Our next step in making this process work is to authenticate with the access point. This is important, as if we perform a packet injection without the association and with the access point present, the process will fail and the connection will be rejected. In fact, if the source MAC address which is being injected is not associated, the targeted API will ignore the packet and send out a deauthentication packet in cleartext to refuse the connection attempt. When this occurs, no new IVs are created because the AP is ignoring all the injected packets.

The MAC you use for injection must be associated with the AP by either using fake authentication or by using an MAC from an already-associated client. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required