Time for action – deauthentication attack on the client
We will assume that the wireless client has a network Wireless Lab
configured on it, and it actively sends probe requests for this network, when it is not connected to any access point. In order to find the security configuration of this network, we will need to create multiple access points. For our discussion, we will assume that the client profile is an open network, WEP protected, WPA-PSK, or WPA2-PSK. This means we will have to create four access points:
- To do this, we will first create four virtual interfaces—
wlan0mon
towlan0mon3
, using theiw wlan0 interface add wlan0mon type monitor
command multiple times adding 1 to the end of the monitor name each time: - You can view all these newly ...
Get Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.