-
Book Overview & Buying
-
Table Of Contents
BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :
Let the games begin:
Let us first configure our access point to use MAC filtering and then add the client MAC address of the victim laptop. The settings pages on my router look as follows:

Once MAC filtering is enabled only the allowed MAC address will be able to successfully authenticate with the access point. If we try to connect to the access point from a machine with a non-whitelisted MAC address, the connection will fail as shown next:

Behind the scenes, the access point is sending Authentication failure messages to the client. The packet trace would resemble the following:

In order to beat MAC filters, we can use airodump-ng to find the MAC addresses of clients connected to the access point. We can do this by issuing the commands airodump-ng -c 11 -a --bssid 00:21:91:D2:8E:25 mon0. By specifying the bssid, we will only monitor the access point which is of interest to us. The -c 11 sets the channel to 11 where the access point is. The -a ensures that...
Change the font size
Change margin width
Change background colour