- Kali Linux Wireless Penetration Testing Beginner's Guide(Third Edition)
- Cameron Buchanan Vivek Ramachandran
- 376字
- 2021-07-02 20:05:45
Time for action – beating MAC filters
Let's follow the instructions to get started:
- Let's first configure our access point to use MAC filtering and then add the client MAC address of the victim laptop. The settings pages on my router looks as follows:
- Once MAC filtering is enabled, only the allowed MAC address will be able to successfully authenticate with the access point. If we try to connect to the access point from a machine with a non-whitelisted MAC address, the connection will fail.
- Behind the scenes, the access point is sending authentication failure messages to the client. The packet trace resembles the following:
- In order to beat MAC filters, we can use
airodump-ng
to find the MAC addresses of clients connected to the access point. We can do this by issuing theairodump-ng -c 10 -a --bssid <mac> wlan0mon
command. By specifying thebssid
command, we will only monitor the access point, which is of interest to us. The-c 10
command sets the channel to10
, where the access point is. The-a
command ensures that, in the client section of theairodump-ng
output, only clients associated and connected to an access point are shown. This will show us all the client MAC addresses associated with the access point: - Once we find a whitelisted client's MAC address, we can spoof the MAC address of the client using the
macchanger
utility, which ships with Kali. You can use themacchanger –m <mac> wlan0mon
command to get this done. The MAC address you specify with the-m
command option is the new spoofed MAC address for thewlan0mon
interface: - As you can clearly see, we are now able to connect to the access point after spoofing the MAC address of a whitelisted client.
What just happened?
We monitored the air using airodump-ng
and found the MAC address of legitimate clients connected to the wireless network. We then used the macchanger
utility to change our wireless card's MAC address to match the client's. This fooled the access point into believing that we were the legitimate client, and it allowed us access to its wireless network.
You are encouraged to explore the different options of the airodump-ng
utility by going through the documentation on their website at http://www.aircrack-ng.org/doku.php?id=airodump-ng.
推薦閱讀
- 自己動手實現Lua:虛擬機、編譯器和標準庫
- Java加密與解密的藝術(第2版)
- Python機器學習經典實例
- 精通Python設計模式(第2版)
- 微信小程序入門指南
- Hands-On Reinforcement Learning with Python
- 數據結構習題解析與實驗指導
- C語言程序設計上機指導與習題解答(第2版)
- Scratch3.0趣味編程動手玩:比賽訓練營
- Hands-On Neural Network Programming with C#
- R語言:邁向大數據之路(加強版)
- 從零學Java設計模式
- Microsoft HoloLens By Example
- Building a Media Center with Raspberry Pi
- Python趣味創意編程