
Sign up to save your podcasts
Or

Course 14 - Wi-Fi Pentesting | Episode 3: Targeted Wireless Network Discovery and Pre-Connection Bypasses

In this lesson, you’ll learn about:- Sniffing wireless networks on both 2.4 GHz and 5 GHz bands
- Performing targeted packet capture on a specific access point
- Saving and analyzing captured wireless traffic
- Executing deauthentication attacks without knowing the password
- Discovering the names of hidden wireless networks
- Reconnecting to hidden networks after revealing their SSIDs
- How MAC filtering works and how it is bypassed
Targeted Wireless Discovery & Pre-Connection Access Wireless Band Sniffing (2.4 GHz & 5 GHz) Wireless networks broadcast on two main frequency bands:Key points:- By default, airodump-ng only sniffs the 2.4 GHz band
- To sniff 5 GHz, you must use:
- To sniff both at once:
- Sniffing both bands:
- Requires a powerful wireless adapter
- Is usually slower
- The adapter must support 5 GHz, otherwise no data will be captured from that band
Targeted Sniffing & Data Capture Instead of capturing all networks, you can focus on:- One specific target network
This is done by specifying:- BSSID: Target network MAC address
- Channel: Operating channel
Targeted capture allows you to:- View only:
- The target access point
- Connected clients (stations)
- Save captured packets to files:
- Even though all packets are captured:
- If the network uses WPA/WPA2
- The data appears encrypted and unreadable
- Wireshark will display it as gibberish without the key
The Deauthentication Attack A deauthentication attack allows you to:- Disconnect any connected device
- Without:
- Knowing the Wi-Fi password
- Being connected to the network
How it works:- The attacker pretends to be:
- The router when talking to the client
- The client when talking to the router
- This forces the device to disconnect
Tool used:Discovering Hidden Networks Hidden networks:- Do not broadcast their SSID (name)
- Still broadcast:
- MAC address
- Channel
- Encryption type
Steps to reveal a hidden SSID:- Run airodump-ng against the hidden network only
- If a client is connected:
- Launch a deauthentication attack
- Send a small number of packets (e.g., 4)
- When the client reconnects:
- It sends the network name in the air
- Airodump-ng captures:
- The previously hidden SSID
Connecting to Hidden Networks After discovering the SSID:- The wireless card must return to:
This can be done by:- airmon-ng stop
- Or by:
- Disconnecting and reconnecting the wireless adapter
If the network manager service is stopped:- Restart it using:
- service network-manager start
Once restored:- Manually enter:
- The discovered SSID
- The correct security type
- Then connect normally
Bypassing MAC Filtering MAC filtering controls which devices can connect using:Two types: Blacklist- Blocks specific MAC addresses
- Easily bypassed by:
- Changing your MAC address to a random one
Whitelist- Only allows specific MAC addresses
- Harder to bypass, but still possible
Bypassing a whitelist:- Use airodump-ng to detect:
- A client already connected to the target network
- That client’s MAC must be:
- Use macchanger with:
- -m to clone that MAC address
- Return to managed mode
- Connect to the network successfully using the spoofed MAC
You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy ...more
View all episodes
By CyberCode Academy
Course 14 - Wi-Fi Pentesting | Episode 3: Targeted Wireless Network Discovery and Pre-Connection Bypasses

In this lesson, you’ll learn about:- Sniffing wireless networks on both 2.4 GHz and 5 GHz bands
- Performing targeted packet capture on a specific access point
- Saving and analyzing captured wireless traffic
- Executing deauthentication attacks without knowing the password
- Discovering the names of hidden wireless networks
- Reconnecting to hidden networks after revealing their SSIDs
- How MAC filtering works and how it is bypassed
Targeted Wireless Discovery & Pre-Connection Access Wireless Band Sniffing (2.4 GHz & 5 GHz) Wireless networks broadcast on two main frequency bands:Key points:- By default, airodump-ng only sniffs the 2.4 GHz band
- To sniff 5 GHz, you must use:
- To sniff both at once:
- Sniffing both bands:
- Requires a powerful wireless adapter
- Is usually slower
- The adapter must support 5 GHz, otherwise no data will be captured from that band
Targeted Sniffing & Data Capture Instead of capturing all networks, you can focus on:- One specific target network
This is done by specifying:- BSSID: Target network MAC address
- Channel: Operating channel
Targeted capture allows you to:- View only:
- The target access point
- Connected clients (stations)
- Save captured packets to files:
- Even though all packets are captured:
- If the network uses WPA/WPA2
- The data appears encrypted and unreadable
- Wireshark will display it as gibberish without the key
The Deauthentication Attack A deauthentication attack allows you to:- Disconnect any connected device
- Without:
- Knowing the Wi-Fi password
- Being connected to the network
How it works:- The attacker pretends to be:
- The router when talking to the client
- The client when talking to the router
- This forces the device to disconnect
Tool used:Discovering Hidden Networks Hidden networks:- Do not broadcast their SSID (name)
- Still broadcast:
- MAC address
- Channel
- Encryption type
Steps to reveal a hidden SSID:- Run airodump-ng against the hidden network only
- If a client is connected:
- Launch a deauthentication attack
- Send a small number of packets (e.g., 4)
- When the client reconnects:
- It sends the network name in the air
- Airodump-ng captures:
- The previously hidden SSID
Connecting to Hidden Networks After discovering the SSID:- The wireless card must return to:
This can be done by:- airmon-ng stop
- Or by:
- Disconnecting and reconnecting the wireless adapter
If the network manager service is stopped:- Restart it using:
- service network-manager start
Once restored:- Manually enter:
- The discovered SSID
- The correct security type
- Then connect normally
Bypassing MAC Filtering MAC filtering controls which devices can connect using:Two types: Blacklist- Blocks specific MAC addresses
- Easily bypassed by:
- Changing your MAC address to a random one
Whitelist- Only allows specific MAC addresses
- Harder to bypass, but still possible
Bypassing a whitelist:- Use airodump-ng to detect:
- A client already connected to the target network
- That client’s MAC must be:
- Use macchanger with:
- -m to clone that MAC address
- Return to managed mode
- Connect to the network successfully using the spoofed MAC
You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy ...more