Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Post reply

Message icon:

(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program captures traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: misterx
« on: October 19, 2021, 08:33:36 pm »

Yes, you can do a packet capture on the same channel as the AP. You should see A LOT of deauthentication.

Note that AP use deauthentication as well, but they usually send one, whereas aireaplay-ng for example sends like 64/128 every time.

Once you figured that it's actually a deauthentication attack, grab the mac address of the device doing it, then do direction finding, basically, walking with a directional antenna.
Posted by: jjj
« on: October 19, 2021, 05:10:35 am »


I'm looking to see if there's a way to confirm deauth attack and locate source of the attacker. I've got a device that my asus router log says is continuously deauthing. There are times when it's compeletly fine then it just happens. I've seen the $50 watch devices how they are able to do this but I'm looking to see, maybe there's a way to confirm even with a different wireless router and cloning the MAC address and see if at different location, that device will also be deauth attacked.

Any ideas? Please let me know. I think it's people close to my home.