Skip to content

phildom/80211mgmtDoS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Copyright (c) 2011 Dominik Lang <[email protected]>

Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.


An implementation of the Deauthentication 802.11 DoS attack based
on the unprotected Management Frames.
This implementation is written for OpenBSD and BSD like systems. It
works as is on OpenBSD. Other BSDs and Mac OS X may need a few minor
adjustments.

With time I will add more information and other attacks.
I have already implemented the following attacks:
Association Request
Quiet
Channel Switch Announcement

Stay tuned.

Notes:
- You need to check the network memory.
  It depends, sometimes it completley fills up the memory.
  $ netstat -m

- The interface needs to be active. The best way to do this
  is by reseting the interface, e.g. on OpenBSD with:

# ifconfig ath0 -nwid -bssid -chan -wpa -nwkey media autoselect mediaopt monitor

  And then setting the interface into monitor mode on the channel
  or a channel nearby the AP's channel, e.g.:

# ifconfig ath0 chan 6 media autoselect mediaopt monitor

About

802.11 DoS Attacks based on unprotected Management frames

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages