Tags

Daily Weblog 9/22/17

Today, I tried cloning other Elab networks, and trying to get my phone to accidentally connect to them. This was harder than last time; I think I got lucky on my first couple attempts. Picking the right channel is an important part of the spoofing process (as the device will usually reuse the same one), so for future reference: having a MAC address lookup table is important. I learned more about how the Aircrack suite works, especially the data produced by Airodump. Over the weekend, I need to research how to fake security keys, as clones of networks that are secured appear as obviously unsecured, and devices will avoid the insecure access point by preference. Fun fact: it's illegal in the United States to transmit WiFi at a power above 27 dBm. Also, I started learning how to use Ettercap, an ARP cache poisoning tool, and will continue to research it for future man-in-the-middle attacks. This weekend, I'll also try deauthenticating users on my home network.

Comments