I'm using airgeddon (https://github.com/v1s1t0r1sh3r3/airgeddon
) to perform a deauthentication attack on my wifi network.
When i put my wireless interface in monitor mode to scan the network from the outside I found the router's BSSID, which is 10:13:31:F1:48:8D
, and then I tried to perform various deauthentication attacks on the network but all of them failed: my computer can successfully send packets but the network is not affected (since my other devices can access internet normally).
Then I ran Zenmap from inside of the network to check if my router's BSSID was correct and I found that all the devices connected to wifi shown a different BSSID for the router, which is: 10:13:31:F1:48:8C
: the difference is in the last digit.
So I tried to perform the attack on the 8C
BSSID manually (because it is not detected by airodump-ng) but the attack fails.
This is what I used for the attack:
aireplay-ng -0 0 -a 10:13:31:F1:48:8C wlp3s0mon
and the result is:
00:03:55 Waiting for beacon frame(BSSID 10:13:31:F1:48:8C) on channel 1
00:04:05 No such BSSID available.
using the channel 1 for the attack (the same attack works with 8D
and channel set on 1).
There's a way to perform the attack on the correct BSSID?
Edit -------------------------
I've check if I'm currently injecting packets correctly , using
aireplay-ng -9 wlp3s0mon
and the output says Injection is working!
Then I put the security measures of my router in "low mode" but the attack is failing again and again.
I tried to impersonalize another device using -s
option but then I recive 0/64 ACKs while attacking computer or phones.
The only devices that seems to be vulnerable is a linux wifi printer which gives me 64/64 ACKs but i can't check easily if it's actually working.