O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action De-Authentication DoS attack

Follow these instructions to get started:

  1. Let us configure out Wireless Lab network to use Open Authentication and no encryption. This will allow us to see the packets using Wireshark easily:
    Time for action De-Authentication DoS attack
  2. Let us connect a Windows client to the access point. We will see the connection in the airodump-ng screen:
    Time for action De-Authentication DoS attack
  3. Now on the attacker machine, let us run a directed De-Authentication attack against this:
    Time for action De-Authentication DoS attack
  4. Note how the client ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required