Can’t seem to deauth my ‘victim’ from the WiFi

Can't seem to deauth my 'victim' from the WiFi

  • Running Kali on a Raspberry Pi 4b
  • Target network is 2.4 GHz provided by a Netgear RAX10 using WPA2-Personal
  • Target computer is a Windows box connecting to the router via an ASUS USB-AX56 Nano

I can capture handshakes when I turn the target computer’s WiFi off and then on again, so my capturing procedure isn’t at fault. However, I have not been able to forcibly deauthenticate the target computer via aireplay-ng or mdk4.

sudo aireplay-ng --deauth 0 -a <router MAC> -c <victim MAC> wlan0mon gives me a string of attempts marked with [ 0| 0 ACKs]sudo mdk4 wlan0mon d -B <router MAC> -S <victim MAC> just hangs with no output until I hit Ctrl+Csudo mdk4 wlan0mon d -S <victim MAC> similarly hangs with no outputsudo mdk4 wlan0mon d -B <router MAC> spams the screen with deauth messages but none of them include the MAC of the victim

Also of note – both aireplay-ng and MDK claim to be deauthing my C&C box but no handshakes are captured and the connection isn’t broken.I don’t **think** I’m doing anything wrong, but I’m not getting the results I expect.Is my router just too resilient, or is there something else I should be adding to my attacks to make them more successful?

edit screencap from the router spec sheet. Looks like I’m playing on hard mode when I should be on easy?

https://preview.redd.it/8jxeltcgn73b1.png?width=351&format=png&auto=webp&s=83da51757f15755a405eb27d763ce504693c8cc4

submitted by /u/Shelgeyr1970
[link] [comments]

May 31, 2023
Read More >>