Authentication flood attack

When attempting to associate with a wireless network, clients search for an in range access point and request to connect. This authentication process takes place prior to joining the network. Any wireless client must first authenticate to the target network and ensure compatibility before being able to join and forward traffic over a given wireless network.

There are two different methods of authentication. They are as follows:

  • Open System Authentication
  • Shared Key Authentication

In Open System authentication, there is no verification of the identity of the devices and any wireless client can join the network, assuming it has the required characteristics, such as data transfer rates and a wireless protocol.

In Shared Key ...

Get Mastering Kali Linux Wireless Pentesting now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.