Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In my home pentest lab I though it would be interesting to try this scenario and

ID: 659955 • Letter: I

Question

In my home pentest lab I though it would be interesting to try this scenario and see if it works:

I have 2 computers and 1 AP, computer A is authenticated to the access point with WPA2 and computer B wants to run a MiTM attack on computer A by making it connect to a fake network. But, computer Bs antenna is not as powerful as computer As so in result computer B can only contact computer A and not the AP thus making a deauth attack though the usual tools useless.

My question is this: Is there a way/utility to deauth a computer without being able to get a frame from the AP?

Explanation / Answer

You only need the BSSID information from the AP to run the aireplay command. Since you said that you are looking for a tool that would let you provide the AP information manually, the command would be like this:

aireplay-ng -0 1 -a <AP BSSID> -c <COMPUTER A> interface

And to get the AP BSSID you could use the airodump-ng, and look at the AP computer A is connected at. (in this case, airodump would get the BSSID based on the computer that is connected to it)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote