Time for action – De-Authentication DoS attack
Follow these instructions to get started:
Let us configure out Wireless Lab network to use Open Authentication and no encryption. This will allow us to see the packets using Wireshark easily:
Let us connect a Windows client to the access point. We will see the connection in the
airodump-ng
screen:Now on the attacker machine, let us run a directed De-Authentication attack against this:
Note how the client gets disconnected from the access point completely. We can verify the same on the
airodump-ng
screen as well:If we use Wireshark to see the traffic, you will notice a lot of De-Authentication packets over the air which we just sent:
We can do the same attack by sending a Broadcast De-Authentication packet on behalf of the access point to the entire wireless network. This will have the effect of disconnecting all connected clients:
What just happened?
We successfully sent De-Authentication frames to both the access point and the client. This has...