In my home pentest lab I though it would be interesting to try this scenario and
ID: 659955 • Letter: I
Question
In my home pentest lab I though it would be interesting to try this scenario and see if it works:
I have 2 computers and 1 AP, computer A is authenticated to the access point with WPA2 and computer B wants to run a MiTM attack on computer A by making it connect to a fake network. But, computer Bs antenna is not as powerful as computer As so in result computer B can only contact computer A and not the AP thus making a deauth attack though the usual tools useless.
My question is this: Is there a way/utility to deauth a computer without being able to get a frame from the AP?
Explanation / Answer
You only need the BSSID information from the AP to run the aireplay command. Since you said that you are looking for a tool that would let you provide the AP information manually, the command would be like this:
aireplay-ng -0 1 -a <AP BSSID> -c <COMPUTER A> interface
And to get the AP BSSID you could use the airodump-ng, and look at the AP computer A is connected at. (in this case, airodump would get the BSSID based on the computer that is connected to it)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.