Executing a deauthentication flood

This first availability attack is an interesting one, and an effective one at that. This attack is known as a disassociation flood. In this type of attack, the malicious parties are trying to break the association that a client has with an access point. When this type of attack is carried out, clients will experience a situation where they are bumped off the wireless access point and will find themselves trying to reconnect to the access point. The key word here is if they can attach to the wireless access point. If this flood is carried out in a high enough volume, and maintained at that level, it can mean that no clients will be able to attach to the wireless network for very long, or at all, depending ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.