-
Notifications
You must be signed in to change notification settings - Fork 4
phildom/80211mgmtDoS
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Copyright (c) 2011 Dominik Lang <[email protected]> Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. An implementation of the Deauthentication 802.11 DoS attack based on the unprotected Management Frames. This implementation is written for OpenBSD and BSD like systems. It works as is on OpenBSD. Other BSDs and Mac OS X may need a few minor adjustments. With time I will add more information and other attacks. I have already implemented the following attacks: Association Request Quiet Channel Switch Announcement Stay tuned. Notes: - You need to check the network memory. It depends, sometimes it completley fills up the memory. $ netstat -m - The interface needs to be active. The best way to do this is by reseting the interface, e.g. on OpenBSD with: # ifconfig ath0 -nwid -bssid -chan -wpa -nwkey media autoselect mediaopt monitor And then setting the interface into monitor mode on the channel or a channel nearby the AP's channel, e.g.: # ifconfig ath0 chan 6 media autoselect mediaopt monitor
About
802.11 DoS Attacks based on unprotected Management frames
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published