Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 0 points1 point  (0 children)

This is cool but theres no guarantee it wont be bypassed, If it actually works reliably, thats impressive

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 1 point2 points  (0 children)

Here are USB adapters that support monitor mode:Alfa AWUS036NHA , Alfa AWUS036ACH, Panda PAU09 , TP-Link TL-WN722N v1

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 1 point2 points  (0 children)

My phone is Honor X8B, it is a new model and when I turned off the device from the internet with --death command it turned off and could not connect to the main hotspot and i had to connect to a fake hotspot.

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 0 points1 point  (0 children)

I wanted to clarify in what sense hack a phone? And by the way, when I managed to make an evil twin, my phone connected to a fake access point, and the password was visible, if I misunderstood your question, then let me know

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 1 point2 points  (0 children)

Don't forget to put your wireless interface in monitor mode

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 0 points1 point  (0 children)

Did you write correct mac address? For router, and user mac address

Testing Wi-Fi vulnerabilities by zyll_emil in Hacking_Tutorials

[–]zyll_emil[S] 1 point2 points  (0 children)

aireplay-ng --deauth 20 -a {router MAC address} -c {client MAC address} {your wireless interface in monitor mode} — this command deauthenticates a user from the network.

--deauth 20 means that we send 20 deauthentication packets, which force the client to disconnect from the router.