I watched a video and went through a thread detailing an aireplay attack using the packet collected from a client that has been disconnected thru another deauth attack. I get the idea start collecting the data. Start the packet replay attack and wait for ARP request that you will generate when you disconnect a client associated with the target AP. The problem I am facing is that the replayed packet is not listened to by the target AP because I am not associated (fake associated) with the target AP. During packet injection I am getting
.in neither of the tut/video do I see anybody doing a fake association attack. Is my mac supposed to appear as the clients. I searched the forum for "Notice: got a deauth/disassoc packet. Is the source MAC associated ?" and areplay and no wisdom was revealed
Notice: got a deauth/disassoc packet. Is the source MAC associated ?