Deauther V3 Tutorial: Beacon Command

Deauther V3 Tutorial: Beacon Command

Stefan's photo
Stefan
ยทNov 6, 2021ยท

3 min read

Subscribe to our newsletter and never miss any upcoming articles

Play this article

Table of contents

  • What are Beacon Frames?
  • Can Beacons be evil?
  • How to use the command
  • Running the command

Create the dozens of WiFi networks that aren't actually there using beacon frames!

๐Ÿ‘‰ For this tutorial, you'll need to start Huhnitor and connect to your Deauther V3. Haven't installed Huhnitor yet? Then, follow this tutorial to find out how.

What are Beacon Frames?

Beacon unsplash Pn6iimgM-wo

Beacon frames are small packets sent out by the access point (i.e., your router) to advertise its network to other WiFi devices in the area. They contain information like the network name and security (Open, WPA2, WPA3,...).

Through these packets, client devices learn about available WiFi networks in the area. That is how your phone knows about the networks you see in the WiFi settings menu. This discovery process is also called passive scanning. Learn more about active and passive scanning in our post about WiFi Probe Requests.

With the beacon command of the Deauther V3, we can send out a lot of these beacon frames and advertise networks with custom names without actually having to create real networks. We can also detect devices trying to connect to our fake networks.

Can Beacons be evil?

WiFi beacon frames are primarily harmless, but some devices can react unexpectedly to certain SSIDs: iPhone Bug breaks WiFi when you join Hotspot with unusual name

It's also possible to advertise common network names and monitor the connection attempts. This way, you can potentially uncover where a device has been. We explained this in more detail in our post about WiFi Probe Requests.

How to use the command

Get an overview of the command structure and available arguments by typing:

help beacon

Structure of the Beacon Command and its available arguments

You can see that all arguments besides the first are in square brackets, meaning they are optional. Below the command structure, you'll find a list of all the available arguments, a short explanation, and their default value (if they're optional).

ArgumentExplanation
-ssid -ssidsA list of network names you want to advertise.
-fromThe sender MAC address / MAC of the imaginary access point.
-toThe receiver's MAC address. Use this to advertise only to a specified device. Leave it blank to broadcast your advertisement to all devices in range.
-enc -encryptionCreate the appearance of a open or wpa2 encrypted network.
-ch -channelAdvertise on a specific channel.
-r -rateThe packet rate at which the frames are sent. 10 frames/s is typical. Increase it to raise the chances of your network being picked up.
-m -mon -monitorMonitor your fake network for connection attempts.
-saveSave all probe requests detected while the attack is running.
-t -time -timeoutHow long until the attack stops.

Running the command

beacon -ssid "Follow @Spacehuhn"

After running the command, you'll see the parameters, a list of network names (SSIDs), and their corresponding sender MAC address (BSSID).

Output when starting a beacon attack

Now your network should show up as an available network.

Fake network showing up in the list of available WiFi networks

Sometimes it can take a minute or so before devices pick up your new network, especially in areas with many access points around. You can boost the discovery process by changing to a less busy channel or by increasing the packet rate.

When you try to connect to your fake network, you'll notice that it will always fail. This is because the beacon frames are advertising a network that is not real. Therefore, there is nothing to connect to. If you want to see those connection attempts enable monitor mode:

beacon -ssid "Free WiFi" -m

You can not read the password that the user entered to join your network, but you can see the MAC address and signal strength.

ย 
Share this