This section will show you an example of Network Attacks against hidden SSID, MAC filter, and WEP encryption.
First, we set the interface to the monitoring mode:
We should pay attention to airmon's suggestions and turn off possible troublesome processes:
Next, run airodump:
The output information of airodump shows a hidden network channel 1. You can say that because it displays <length 11> instead of the SSID value. You can also say that there is a client connection. First, let's start airodump, lock it to the correct channel and start collecting its packets.
Next, we need to unauthenticate the client so that we can see the SSID:
If we switch to airodump at this time, the SSID we see has been exposed:
In this way, we can use the aireplay client to generate some communication traffic:
When running aireplay, we switch to airodump-ng to check the increase in the number of data packets: