Following are the steps to carry out the attack:
- The first step in carrying out this type of attack is to switch your Wi-Fi adapter into monitoring mode, so we can detect the information we need to detect traffic and their associated MAC addresses. To do this, we run the following commands:
airmon-ng start wlan0
- In this case, the command sequence tells Kali to start the airmon-ng process on the wlan0 interface. This application will start the interface in monitoring mode which is very important. Basically, monitor mode in Wi-Fi allows the card to observe all wireless traffic without having to associate to any access point first.
- With this done we now wish to see all the connected clients to a specific access point. To ...