I just have a question on, "What is the best way of receiving an Authentication through aireplay, when a router is MAC filtered?" When I use this command:
With a router that is MAC Filtered, I will not receive the Authentication with the above address. On the other hand, when i spoof the Station Mac that is connected to the router I only get up to [ACK] but then the process keeps repeating. I am in best range.
aireplay-ng -1 0 -a xx:xx:xx:xx:xx:xx -h 00:11:22:33:44:55 -e Blah mon0
So what i am basically looking to do is drop the Station MAC which is connected to the router and spoof it on my computer, hopefully succeeding. How would I drop the Station MAC in order for the Authentication to work properly? Is there an attack which will allow me to do this?
To add, all my tests are from my router. And this is WEP cracking 64/128bit.
Any comments on this? Been about two days.
if a client is connected deauth it with
Originally Posted by fossilk1
aireplay-ng -0 5 -a <ap mac> -c <client mac> <interface>
then inject with the clients mac I usually use -3 which is an arp attack first then try other injection attacks if unsuccessful
aireplay-ng -3 -b <ap mac> -h <client mac> <interface>
it can take a while before you start receiving arp
in other words the only way I know of to inject on a ap with mac filtering is by using a mac that you know is not filtered such as using a clients mac thats connected to the network just deauth them first.
you can use macchanger to change your mac on your interface to match the unfiltered mac