You are on page 1of 5

LAB 7

Bypassing MAC Filtering


First step is to change the network to Monitor mode
$ sudo airmon-ng start wlan0 //To enable the monitor mode

Then we need to start sniffing from wlan0mon. Below screenshot is after start sniffing from
whole network, and we can find BSSID of the access point as we have done already in Lab
3.Below command is for sniffing the access point
$ sudo airodump-ng wlan0mon -w /home/kali/Desktop/crack
this will start sniffing and write the sniffed data to the mentioned path
After getting the BSSID of the access point, then have to find the MAC address of the
Devicewhich already have access (Device which is added and enabled in MAC filter of the
accesspoint).$ sudo airodumb-ng –bssid B0:4E:26:A7:73:4D –channel 6 wlan0mon // used to
check theconnected devices in the access point (TP-LINK_F98A) and connected device’s
MACAddress
After gets the MAC address, we need to change our MAC Address as same as the already
connected device’s MAC Address to bypass MAC filtering. For that we need to use
Macchanger. Command is mentioned below.$ sudo macchanger -m 5E:70:9E:5F:90:9B
wlan0monBut gets error message as in the below screenshot.
After completed all, Now needs to connect to the network, and able to connect successfully
as shown in the below screenshot. Hence, we have successfully bypassed the MAC address
Filtering.

You might also like