The Metasploit CTS/RTS flood attack
In a wireless medium, collisions can degrade the performance of the network. In order to avoid collisions, clients transmitting at the same time, wireless clients, and access points use CTS/RTS, clear to send, and request to send frames before transmitting data. Whenever a wireless client wants to send data, it reserves the medium by sending RTS/CTS frames. In simple terms, when a wireless client is about to send some data, it notifies other devices on the network that it's going to send data and asks others to wait for some time before attempting to transmit themselves. Other stations respect the announcement and wait until the transfer is complete. An attacker can use these unauthenticated frames and create ...
Get Mastering Kali Linux Wireless Pentesting now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.