O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

To perform an association flood, we simply need to use a combination of the steps that we've seen in earlier chapters, with a little extra added in to tweak it for our purposes.

In this scenario, we have a client attached to the wireless access point, or wireless router, going about their business. The attacker is going to attempt to break their connection to the network:

  1. In order to get started, we need to first put our network card into monitor mode. Again, this is no different than what we have done in previous recipes. To make things simple, we will assume that our wireless adapter uses the name wlan0, but double-check to ensure the name is the same on your system:
    airmon-ng start wlan0

Much like before, the airmon-ng ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required