Welcome back, Hackers! In This Tutorial, We’re going to look at Denial of Service (DoS) Attacks, and DoSing a Wireless Access Point. There are various tools that aim to do that, in this tutorial we will be sending repeated deauthentication frames to the access point with aircrack-ng suite, aireplay-ng.
I assume you are a good guy, of course you are, you are in a public WiFi access enjoying your food and watching YouTube on your laptop. You are annoyed with a guy next to you. They were on eager about their talk, talking about their fool friends while showing his/her instagram profile. You just want them to leave, and not to bother you on this certain occasion. Then you immediately plug in your external Alfa wireless adapter to DoSing their smartphones.
STEP 1 : OPEN TERMINAL
Now, you are in a range with the wireless access point and the victims. firstly, you make sure that your Kali Linux recognized the alpha wireless adapter. You ran a command:
STEP 2 : PUT THE ADAPTER INTO MONITOR MODE
Your next step is to put your external wireless adapter in monitor mode. You then ran this command:
airmon-ng start wlan1 && airmon-ng check kill
Your adapter now is on monitor mode on wlan1mon.
STEP 3 : SCAN THE WIRELESS TRAFFIC
You assumed that the victim is the most user of AP which is using the most resource of bandwidth, thus, you we’re sure that the victim is on the highest frame. Then, you note the necessary information into text editor, such AP mac address and victim mac address.
BSSID (Access point) : 60:18:88:B3:1B:60 ESSID (Client) : 9C:A5:C0:05:C4:8C Channel : 6
STEP 4 : CHANGE THE MONITOR MODE BASED ON AP CHANNEL
Next step is to set the monitor mode interface channel the same as the AP has. It is important, don’t miss this step. Because the access point is on channel 6, thus you set your wireless interface to channel 6 too.
ifconfing stop wlan1mon airmon-ng start wlan1mon 6
STEP 5 : LAUNCH ATTACK!
Now, you got all information you need to deauthenticate him, you need to send thousand deauth frames to keep him from reconnecting to the AP. You did this by typing :
aireplay-ng --deauth 1000 -a 60:18:88:B3:1B:60 -c 9C:A5:C0:05:C4:8C wlan1mon
--deauth (count): Deauthentication attack mode -a : Access Point MAC Address -c : Client (Victim) MAC Address
STEP 6 : ENJOY YOUR TIME
Since the attack is launched, due to thousand deauth frames you send, the victim device will not able to connect to the access point for thousands tries connect. He thought that there is something wrong on the wifi, then he and his friend feel bored and leave the place. Now, you win! The victim is gone, and no one will bother you again. Then, you need to clean the attack residue.
STEP 7 : CLEAN UP THE TRASH
Firstly, after terminate the aireplay-ng attack (if it is still running), you then reset your wireless adapter interface mode to its default mode, managed. Then restart the networking and network-manager service, because then we kill those services using “airmon-ng check kill” command. You hit this command:
airmong-ng stop wlan1mon service networking restart service network-manager restart
All is Done. Congratulation, you succeeded to kick them off. you are a winner, and also a good person 🙂 …