Deauthentication Attack using Kali Linux: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
'''NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY.''' | '''NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY.''' | ||
In short a deauth attach makes your wifi card in monitor mode spoof a MAC address of something already connected to the network, the router then says "Hey, there are two devices on here with the same MAC address" it then sends a command to all connected devices to re authenticate, kicking them off the network forcing them to re join. Obviously if you are continuing to run the attack this will happen over and over again meaning devices wont be able to connect to the wifi. | |||
The above is a simple explanation, if you want more technical detail.....Google it. |
Revision as of 15:46, 18 August 2022
This article will show you how to disconnect devices from a network with a deauth attack using Kali Linux and the aircrack-ng suite.
NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY.
In short a deauth attach makes your wifi card in monitor mode spoof a MAC address of something already connected to the network, the router then says "Hey, there are two devices on here with the same MAC address" it then sends a command to all connected devices to re authenticate, kicking them off the network forcing them to re join. Obviously if you are continuing to run the attack this will happen over and over again meaning devices wont be able to connect to the wifi.
The above is a simple explanation, if you want more technical detail.....Google it.