WIFI deauthentication attack using kali linux


Posted July 11, 2021 by techohalic

In this article, I will explain a very useful attack lies under pre-connection wireless attacks category, which is known as WIFI Deauthentication attack, it is also known as WIFI deauth attack.

 
In this article, I will explain a very useful attack lies under pre-connection wireless attacks category, which is known as WIFI Deauthentication attack, it is also known as WIFI deauth attack.
What is WiFi Deauthentication Attack?
WiFi Deauthentication Attack allows us to disconnect any device from any network, without connecting to that network and even without knowing the password of that network. It is a kind of ‘Denial-of-service’ attack, which is used to disconnect the devices connected to a WiFi network by continuously sending data packets or disassociate beacons to that Access Point. The attack targets the communication between the clients or users and the Access Point they are connected with.
Working of WiFi Deauthentication Attack
In this attack the attacker pretends to be client which is to be disconnected from the network by changing the MAC address to the client’s MAC address. And then sends some special deauthentication packets to the client as a spoofed Access Point and say that “you are not a authenticated user,validate yourself”. The process revokes the connection between the router and the client. After all of that, the Access Point and the user realize that they need to authenticate again. Now as the client has the key/password saved in the to-be-validated packet, attackers can capture that and later on they can decrypt that to compromise the network.
Denial Of Service Attack or DOS Attack
Denial Of Service Attack is a kind of cyber attack in which the aim of attacker is to make a system or resource unavailable to its users by allocating all the resources to himself. We can perform this attack by flooding the tons of requests which that resource will not able to handle. So its resources will get overloaded which will make the system or its services disable or unavailable for some time.
But, why to use deauthenticate?
It could be use in following cases:
1. Cracking Wi-Fi password
2. In case of Fake Access Point Attack
3. In information gathering to perform other greater attacks
4. To disconnect fake users
5. Just for fun or to Irritate someone.
How to deauthenticate devices in a Wi-Fi network?
To perform a deauthentication attack following are prerequisite
A system having Kali Linux
WiFi card which supports monitor mode
You can check this tutorial to install Kali Linux on virtual box: How to Install Kali Linux in Virtual box
How to perform wifi deauthentication attack.
There are number of tools available like ip manager, aireplay-ng etc. to perform this attack.
For this tutorial I am going to use aireplay-ng, because it is very simple to use.
Read more at Techohalic
https://techohalic.com/wifi-deauthentication-attack/
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By Techohalic
Phone 09878617663
Business Address Chandigarh, India
Country India
Categories Entertainment
Tags deauthenticationattackkali , deauthenticationattackwifi , preventwifideauthenticationattack , techohalic , wifideauthentication , wifideauthenticationattack
Last Updated July 11, 2021