Time for action – De-Authenticating the client
Follow the instructions to get started:
Let us first bring our access point Wireless Lab online again. Let us keep it running on WEP to prove that even with encryption enabled it is possible to attack the access point and client connection. Let us verify that the access point is up by using
airodump-ng
:Let us connect our client to this access point as we verify it with
airodump-ng
:We will now run
aireplay-ng
to target the client and access point connection:The client gets disconnected and tries to reconnect to the access point, we can verify this by using Wireshark just as before:
We have now seen that even in the presence of WEP encryption, it is possible to De-Authenticate a client and disconnect it. The same is valid even in the presence of WPA/WPA2. Let us now set our access point to WPA encryption and verify the same.
Let's connect our client to the access point and ensure it is connected:
Let us now run
aireplay-ng
to disconnect the client...