312
◾
Ethical Hacking and Penetration Testing Guide
Step 1
—We would create a text file with the name “target” where we will specify the bssid of
our target. The –d parameter would be used to specify a deauthentication attack; the –c
parameter
is used to specify the channel, which in this case would be 11 since my access
point is on channel 11.
Command
:
mkd3 mon0 d –b target –c 11
Since the signal strength of our access point would be strong, our victim would connect to us
and we can launch attacks against them.
Conclusion
In order to
overcome physical limitations, more and more home and corporate users are moving
toward wireless networks, without any concern for the issues that wireless networks can bring.
Even though access points can be completely secure and the pre-shared keys complex enough that
they can’t be cracked, there is still room for possible attacks on clients—the weakest links.