This command includes the following options: The airodump-ng command to capture the data we want: airodump-ng -c 6 -essid kr00ktestnw -w airodump_kr00k1 wlan0mon ![]() We will use the airodump-ng tool to capture the packets. We can now start capturing WiFi packets from the air. To do so we use the following airmon-ng command: airmon-ng start wlan1 6 We will place the device in monitoring mode fixed on the channel our WiFi network uses (channel 6). To be able to capture data which contains packets vulnerable to the kr00k vulnerability we use the following tools and settings.įirst we need to put the WiFi device, which we want to use to capture data, in monitoring mode on the Attacker VM. The kr00k vulnerability happens at the moment the WiFi connection gets disconnected while packets are still being send. Connected to the router via one of the LAN ports.“High power” card, Ralink RT2870/RT3070. ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |