O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step five – power up

In order to ensure that we have the best chance of capturing clients, we need to ensure that our signal is better than the access point's we are cloning. In the event that you cannot position yourself closer, you can always turn up the power to ensure you have a stronger signal.

To generate a more powerful signal, we can do the following:

    iwconfig wlan0 txpower 27
  

The following shows the result of the iwconfig command. Note the Tx-Power setting:

By sending a deification packet out, we are purposely booting a client that has connected to a legitimate access point off the network in an effort to get them to reconnect to our network instead. While just sending deification frames to a client connected to, a specific access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required