O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Executing a deauthentication flood

This first availability attack is an interesting one, and an effective one at that. This attack is known as a disassociation flood. In this type of attack, the malicious parties are trying to break the association that a client has with an access point. When this type of attack is carried out, clients will experience a situation where they are bumped off the wireless access point and will find themselves trying to reconnect to the access point. The key word here is if they can attach to the wireless access point. If this flood is carried out in a high enough volume, and maintained at that level, it can mean that no clients will be able to attach to the wireless network for very long, or at all, depending ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required