added video: difference deauthing and jamming

This commit is contained in:
Stefan Kremser 2017-08-12 11:27:20 +02:00 committed by GitHub
parent 915b168bd7
commit 2622d4dd11
1 changed files with 2 additions and 0 deletions

View File

@ -39,6 +39,8 @@ With this software flashed onto it, you can select a target network and start di
The deauth attack will, if the connection is vulnerable, disconnect the devices from the network. Because the attack is running constantly, the devices will be disconnected again and again. Depending on the network, that can either block a connection or slow it down.
**The difference between deauthing and jamming:** [WiFi Jammers vs Deauthers | What's The Difference?](https://www.youtube.com/watch?v=6m2vY2HXU60)
Other attacks also have been implemented, such as beacon and probe request flooding.
The deauth attack works by exploiting an old and known vulnerability in the 802.11 Wi-Fi protocol.