As was said, there are plenty of ways to impact the availability of a wireless network. They all have the same basic goal, which is to prevent the wireless network from being attached to and used effectively, or at all.
Before we start discussing each of the attacks in depth, we should first define which attacks we are going to be covering in this chapter:
- Executing a disassociation flood
- Detecting beacon frames
- Spoofing beacon frames
- Executing a beacon flood
- Executing a deauthentication flood
- ARP cache poisoning
- Performing a denial of service
- Hiding a wireless network
These attacks represent some of the more popular ways of impacting the availability of a wireless network, and as such we are presenting them here. As always, ...