Wireless Hacking
◾
297
Step 2
—The next step would be to find a client that is already associated with the access point.
We will use airodump to find it for us.
Command
:
airodump-ng –c 1 –a –bssid F4:3E:61:9C:77:3B mon0
Since the access point is on channel 1, we would type –c 1; the “–a”
parameter would display
clients that are currently associated with the access point.
The output shows us that two stations are currently up with MAC addresses
B0:D0:9C:5C:EF:86 and 48:DC:FB:B1:F3:7D.
Step 3
—The final step would be to spoof our MAC address and change it to one of the client’s.
We can use a neat program in BackTrack called macchanger, but for that, we would need to
disable the monitor mode first.
Command
:
airmon-ng stop wlan0
Next, we would use the following command to spoof our current MAC address.
macchanger –m B0:D0:9C:5C:EF:86 wlan0
The
MAC address of the client, B0:D0:9C:5C:EF:86, is already associated with the access
point. Finally, we would issue the following command to bring the wlan0 interface up.