GarrettVD Posted August 5, 2014 Share Posted August 5, 2014 Scenario: I have a WPA2-secured wireless network of which I know the password. Is it possible (with the Pineapple or via some other method) to connect mimic the MAC address, security, password of the target AP while performing a deauthentication attack on said router, in order to have network devices on the target AP's network automatically connect to my "cloned" AP? I understand that this works for open wireless network, just wondering if it will work (and if there is support for this) on secured-wireless networks? In this sense, I could run ettercap etc. on my cloned AP device, where I would not be able to had I simply connected to the target AP as client. Quote Link to comment Share on other sites More sharing options...
barry99705 Posted August 5, 2014 Share Posted August 5, 2014 No, the deauth works against the mac address. If you cloned the mac of the legit access point your deauth will kill both access points. There's really no reason to clone the mac of the real network, 99% of people don't check that anyway. Quote Link to comment Share on other sites More sharing options...
i8igmac Posted August 6, 2014 Share Posted August 6, 2014 on linux have u tested airbase-ng And dnsmasq? first try to set up a proper fake AP... Quote Link to comment Share on other sites More sharing options...
cooper Posted August 6, 2014 Share Posted August 6, 2014 If you set up your AP on a different channel then the deauth should work just fine. It won't harm you as your AP is active on a completely different frequency so it won't see any of the deauths and if your signal appears stronger to the clients than that of the real AP the clients will prefer to connect to you. I've set this up at multiple places now where a house is large and too dense for the wireless signal to get everywhere, so I simply wired up a second AP with the same SSID and password but using a different channel and IP subnet. Works like a charm. Only difference between this setup and your is that you'd like to prevent people from accessing the one, thus favoring the other. Quote Link to comment Share on other sites More sharing options...
GarrettVD Posted August 7, 2014 Author Share Posted August 7, 2014 Yeah I managed to do just like you said Cooper, and it works fine that way. Thanks. Quote Link to comment Share on other sites More sharing options...
GarrettVD Posted August 7, 2014 Author Share Posted August 7, 2014 Or rather, danke. Quote Link to comment Share on other sites More sharing options...
cooper Posted August 7, 2014 Share Posted August 7, 2014 That's german. The dutch word is "Bedankt". And you're very welcome. :) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.