This article will be focusing on how to do a very basic WiFi “DeAuth” or deauthentication Attack using Kali Linux and the WiFi hacking tools included in it. I’ve been working in IT now for over 20 years and spend a percentage of my professional development time on InfoSec and IT Security related items as I feel its important to know how to use technology but also how criminals use the same technology to do bad things. My Journey into Wi-Fi Hacking and Deauthentcation Attacks If the attacker is relentless, your only option is to change your SSID but they can just pick it up again and repeat the process. ![]() ![]() Even if device does connect briefly, we eventually intercept one of the packets and device will disconnect. This attack results in interruption in service for wireless devices by forcing them to disconnect from the target network.Īs the device tries to reconnect, we continue to send deauth packets. This article on deauthentication (Deauth) attacks on Hackernoon is a good a starting point.Ī Wi-Fi deauthentication attack is a Denial of Service (DOS) attack done over Wi-Fi by flooding the air with deauthorization frames while spoofing the Wi-Fi SSID of your target wireless network.
0 Comments
Leave a Reply. |