Search the Community
Showing results for tags 'deauth attack'.
Hi everyone, I just updated to FW 2.5.2 and tried to utilise the deauth feature from the recon module. The Pineapple sees my AP, my client and I can also deauth it. However no handshake is captured (or I am looking in the wrong direction). When I use the "Site Survey" module I am able to capture and save the handshake in .cap format. Any idea what I do wrong? I have attached some pictures documenting the process. Some interesting remark. In step 3, when I can start the capture and the deauth button appears, it never succeeds in deauth the client. I have to close the pop up window and then manually select the client and choose "deauth clients" with a multiplier of 9 or similar (the client here is an iOS 9.3.3). I am happy to receive any ideas or feedback and any input is highly appreciated. Regards, Tom
Hey. I'm having some trouble kicking clients off a certain access point. Everything seems to be working fine, until i launch the aireplay-ng deauth attack, I have double checked the MAC addresses, of both the AP and client. I tried changing the channel manually when I set up airmon-ng wlan0 'channel' to match the AP but it doesn't seem to help. Commands i use: Sudo ifconfig wlan0 down sudo airmon-ng start wlan0 sudo airodump-ng mon0 sudo aireplay -0 0 -a 'MAC of access point' -c 'MAC of client' mon0 It replies: "Waiting for beacon frame (BSSID: "...") on channel 9 "No such BSSID available" I have tried putting in the ESSID insted with -e "ESSID of access point", but it returns the same. There's a link for screenshots here: https://imgur.com/a/Q7c8t Any suggestions ?