Samanta Posted April 26, 2018 Posted April 26, 2018 Hello guys,im currently learning wpa2 hacking.Actually,i'm using social engineering w/ fake ap(linset,fluxion,airset and etc) and i havea few questions.. 1)Is there any way to hide the real Ap during the deauth spam to make the atack realer and convincing? 2)Can i modify the fake ap with wpa2 encryption to make more real and legitim?With handshake,maybe i can control the password if the victim put wrong... Im using kali and i have 3 wifi adpt btw... Quote
Samanta Posted April 27, 2018 Author Posted April 27, 2018 11 hours ago, Bigbiz said: Macchanger comes to mind! What u mean? i don't undestand Quote
PoSHMagiC0de Posted April 28, 2018 Posted April 28, 2018 Not quietly. There is no way to stop the beacon of the real access point unless you jam the channel/frequency it is on which is very loud. Quote
Bigbiz Posted April 28, 2018 Posted April 28, 2018 If you use macchanger it will spoof your AP mac address to whatever you want that way you could be a legitimate AP but not your own. Quote
PixL Posted April 28, 2018 Posted April 28, 2018 Use a laptop (with battery) and then wait until there is a power cut.... your victims should connect once their router has gone off ? Quote
PoSHMagiC0de Posted April 28, 2018 Posted April 28, 2018 12 hours ago, Bigbiz said: If you use macchanger it will spoof your AP mac address to whatever you want that way you could be a legitimate AP but not your own. He is looking to make the original AP vanish from wireless list on victim's device so only his fake ap with same name is there. Essentially blocking all probe responses from the victim's AP and beacons. Changing your mac will not do that. Quote
Samanta Posted April 28, 2018 Author Posted April 28, 2018 7 minutes ago, PoSHMagiC0de said: He is looking to make the original AP vanish from wireless list on victim's device so only his fake ap with same name is there. Essentially blocking all probe responses from the victim's AP and beacons. Changing your mac will not do that. Exactly.. Quote
PixL Posted April 28, 2018 Posted April 28, 2018 Use MDK3 to send beacon requests out with the MAC address of the target AP and a random SSID to hide it behind... it will depend on transmission power of your attack platform compared to the target AP though. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.