Recently, there has been increased interest in the use of optical networks for disaster recovery of large computer systems by extending storage area networks (SANs) over hundreds of kilometers or more. The output after this de-authentication command is executed is shown in Figure 3. Further examining the command syntax, -a 00:25:9C:3B:8B is the MAC address of the access point and -c 08:3E:8E:C1:52:BD is the MAC address of the target that the attacker is de-authenticating. In this command syntax, the number 100 is the number of de-authentication packets to send (this value is somewhat arbitrary, and was selected to provide good results on our test network). Finally, the aireplay-ng – ignore-negative-one –death 100 –a 00:25:9C:3B:8B –c 08:3E:8E:C1:52:BD wlan0 is executed which denies access of the target's wireless AP. Another airodump-ng command is executed to capture data specifically on channel 6, namely airodump-ng –channel 6 – bssid 00:25:9C:3B:B8:8B wlan0. This output provides the hacker with minimal yet sufficient data to perform the DoS attack. Each access point sends about ten beacons per second at the lowest data rate (1 Mbps), therefore the beacon packets can usually be picked up by servers far away from the AP. Beacons are the number of announcements packets sent by the access point (AP). Its BSSID is listed as 00:25:9C:3B:B8:8B with 110 beacons. The test network MythiLNetwork is listed first because its signal strength was the greatest (-7 dBm). WLAN access point results Figure 2 shows the output of all the access points within the signal strength of the wireless network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |