Welcome to Discuss Everything Forums...

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed.


 

Reply to Thread

Post a reply to the thread: WiFi jamming via deauthentication packets

Your Message

Click here to log in

What color is our footer?

 
 

You may choose an icon for your message from this list

Additional Options

  • Will turn www.example.com into [URL]http://www.example.com[/URL].

Rate Thread

You may rate this thread from 1-star (Terrible) to 5-stars (Excellent) if you wish to do so.

Topic Review (Newest First)

  • 09-12-2013, 03:14 AM
    s01andy
    The application areas of jamming device wifi jammer, cell phone jammer varied widely in all walks of life, it can be used in places such as bank, Conference room, auditoriums, law court, library, exam room, school, cinema, theater, and hospital. Beside for the places where the cell phones are not allowed to be used such as government, military, finance, security, police, command center and so many other places this jammer device can also be used.jammerall.com
  • 10-05-2011, 02:35 AM
    Diablo

    WiFi jamming via deauthentication packets


    [Elliot] put together an intriguing proof-of-concept script that uses repeated deauthentication packet bursts to jam WiFi access points. From what we can tell it’s a new way to use an old tool. Aircrack-ng is a package often seen in WiFi hacking. It includes a deauthentication command which causes WiFi clients to stop using an access point and attempt to reauthenticate themselves. [Elliot's] attack involves sending repeated deauthenitcation packets which in essence never allows a client to pass any data because they will always be tied up with authentication.
    After the break you can see a video demonstration of how this works. The script detects access points in the area. The attacker selects which ones to jam and the script then calls the Aircrack-ng command. If you’ve got an idea on how to protect against this type of thing, we’d love to hear about. Leave your thoughts in the comments.

    Filed under: security hacks, wireless hacks

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •