Let the games begin:
Let us first configure our access point to use MAC filtering and then add the client MAC address of the victim laptop. The settings pages on my router look as follows:
Once MAC filtering is enabled only the allowed MAC address will be able to successfully authenticate with the access point. If we try to connect to the access point from a machine with a non-whitelisted MAC address, the connection will fail as shown next:
Behind the scenes, the access point is sending Authentication failure messages to the client. The packet trace would resemble the following:
In order to beat MAC filters, we can use
airodump-ng
to find the MAC addresses of clients connected to the access point. We can do this by issuing the commandsairodump-ng -c 11 -a --bssid 00:21:91:D2:8E:25 mon0
. By specifying thebssid
, we will only monitor the access point which is of interest to us. The-c 11
sets the channel to 11 where the access point is. The-a
ensures that...