Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.6 release


Post reply

Name:
Email:
Subject:
Message icon:

Attach:
(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program captures traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: misterx
« on: October 19, 2021, 08:33:36 pm »

Yes, you can do a packet capture on the same channel as the AP. You should see A LOT of deauthentication.

Note that AP use deauthentication as well, but they usually send one, whereas aireaplay-ng for example sends like 64/128 every time.

Once you figured that it's actually a deauthentication attack, grab the mac address of the device doing it, then do direction finding, basically, walking with a directional antenna.
Posted by: jjj
« on: October 19, 2021, 05:10:35 am »

Hi,

I'm looking to see if there's a way to confirm deauth attack and locate source of the attacker. I've got a device that my asus router log says is continuously deauthing. There are times when it's compeletly fine then it just happens. I've seen the $50 watch devices how they are able to do this but I'm looking to see, maybe there's a way to confirm even with a different wireless router and cloning the MAC address and see if at different location, that device will also be deauth attacked.

Any ideas? Please let me know. I think it's people close to my home.

Thanks,

J