(-c is for channel, channel is 1 for BSSID we're are trying to connect. Let's suppose it's SSID is nhc-BJ.)- Now, we try to find out the client and his MAC associated with this AP (nhc-BJ).- So we can use that MAC to bypass filter, run:Īirodump-ng -c 1 -a -bssid 00:A1:B2:11:20:13:5T mon0 00:A1:B2:11:20:13:5T and channel '1' (Assume the MAC address filter is done in this system. But, here you can use any SSID with Open Encryption, or SSID with known password.- We will use the MAC address that was seen in part 2. Note: We saw in second part how to uncover this hidden SSID. If there's any hidden SSID, then ESSID will be formatted like this: or with no SSID. For monitoring all the APs that Kali Linux OS can find out.- In the next step, you'll get BSSID and ESSID, channel, cipher. After executing above command, we must get new interface mon0 (Monitor mode enabled.)- Verify that both interfaces are up and running, run: (Go to terminal and run ifconfig.)- Let's start to monitor on the wireless interface. - Before starting, make sure that you have eth0, lo, wlan0 in action. Finding an associated client: airodump-ng Finding the AP: airmon-ng & airodump-ng This is third part and I'll explain process of bypassing the MAC Address Filter on an AP (Access Point). > Welcome all, to this series of Kali Linux for Ethical Hacking. Ethical Hacking with Kali Linux - Part 3: Bypassing the MAC Address Filter
0 Comments
Leave a Reply. |