Description: Let’s discuss the attack vectors supported by aireplay-ng. <p> The first attack vector supported is deauth attack. With de-authentication attack you will be able to send broadcast or unicast de-authentication packets. The main purpose of the deauth packets is to break the association between the Station and the AP (Access Point). Many times while cracking the WEP key you will need to capture the connection handshake packets to find out the exact configuration and credentials of AP and Station. With the help of Deauth attack you can disassociate the client from AP, there by inducing the pair to exchange the connection packets like probes and authentication again. Deauth attack is also the most popular DOS (Denial Of Service) attack, but that’s not the purpose of this attack vector in aireplay-NG. </p> <p> This video explains the De-Authentication attack vector. Along with the demonstration of how to use the attack, this video also talks about the importance of these attacks in cracking the WEP key. </p> AireplayNG is a part of AircrackNG suite of products and is used for re-injecting wireless 802.11 frames on to the specified channel. The main aim of aireplay-NG is to generate large amount of traffic so that it can be used later for cracking the WEP or WPA-PSK keys with the help of aircrack-NG. The input to Aireplay-NG will be either the pcap file which needs to be injected or the interface name, as aireplay-NG is even capable of capturing packets on the wireless interface.Links <p> 1. Aireplay-ng Homepage</p> <p> 2. Aireplay-ng Download</p> <p> 3. Aireplay-ng Linux man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.