How can I aireplay ng deauth any device in kali linux?

460    Asked by AnilJha in SQL Server , Asked on Jan 18, 2022

I am using Kali linux. I've updated all tools and services by apt-get update. I was using aircrack-ng for pentesting my wlan network. I wanted to deauth any device connected to my mobile hotspot using aireplay-ng. syntax was correct and it started running, but, no device is being disconnected from my mobile hotspot. I used airmon-ng start wlan0 to initiate my wlan for aircrack-ng. Then, airodump-ng wlan0mon to list all the networks in its vicinity. I used airodump-ng -c [channel of router] --bssid [bssid of router] wlan0mon to show the details of devices connected to that router. Then, I used aireplay-ng --deauth 0 60 -a [bssid of router] wlan0mon to disconnect all the devices connected to that router. It repeated "Sending deAuth to broadcast - - BSSID [bssid of router]" the same line for 60 times, but not even a single device got disconnected from the hotspot. I even tried to deauth a specific device from the router by aireplay-ng --deauth 0 60 -a [bssid of router] -c [mac address of device] wlan0mon, but still,the same case got repeated as above. What should I do? 


Answered by Anil Jha

First of all the command starts like this aireplay-ng --deauth 60 or aireplay-ng -0 60 for 60 packets or to send it continuously (DoS) aireplay-ng --deauth 0 or aireplay-ng -0 0. Anyway if you see an output it means that you typed it right. Second, have you tried the basic troubleshooting for the aireplay ng deauth? Why does deauthentication not work? There can be several reasons and one or more can affect you:

You are physically too far away from the client(s). You need enough transmit power for the packets to reach and be heard by the clients. If you do a full packet capture, each packet sent to the client should result in an “ack” packet back. This means the client heard the packet. If there is no “ack” then likely it did not receive the packet. Wireless cards work in particular modes such as b, g, n and so on. If your card is in a different mode than the client card there is a good chance that the client will not be able to correctly receive your transmission. See the previous item for confirming the client received the packet.

Some clients ignore broadcast deauthentication. If this is the case, you will need to send a deauthentication directed at the particular client. (I see that you already tried this one, some AP have a protection that if you're not "authenticated" it will drop a deauth from a random/unknown source for obvious reasons so always try to add the -c [target_mac] flag) Clients may reconnect too fast for you to see that they had been disconnected. If you do a full packet capture, you will be able to look for the reassociation packets in the capture to confirm deauthentication worked. (Have you opened the packet capture?) Taken from Aircrack-ng documentation Please try all this and share what you wanted to achieve, what have you tried, what were the inputs and outputs.



Your Answer

Interviews

Parent Categories