O'Reilly logo

Kali Linux Wireless Penetration Testing : Beginner's Guide by Vivek Ramachandran, Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action – deauthentication DoS attacks

Follow these instructions to get started:

  1. Let's configure the Wireless Lab network to use Open Authentication and no encryption. This will allow us to see the packets using Wireshark easily:
    Time for action – deauthentication DoS attacks
  2. Let's connect a Windows client to the access point. We will see the connection in the airodump-ng screen:
    Time for action – deauthentication DoS attacks
  3. Now, on the attacker machine, let's run a directed deauthentication attack against this:
    Time for action – deauthentication DoS attacks
  4. Note how the client gets ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required