O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Creating a beacon flood

In this recipe, we will continue our line of thinking and exploration from the previous recipe where we spoofed a beacon frame, but we are going to raise the bar in intensity by trying to attempt a flood of beacon frames. In the previous recipe, we mainly focused on how to create a spoofed beacon frame. Here, what we want to do is send out wave after wave of fake access points with the intention that we can confuse clients in the area and cause them to have performance issues. In fact, the fascinating thing about performing a beacon flood is that under certain conditions it can cause scanners, software, and even drivers to not just under-perform but actually crash or even lock up the system they're present on. You ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required