From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Deauthenticating a wireless host

Deauthenticating a wireless host

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Deauthenticating a wireless host

- [Instructor] Home users and many business users are connected to their networks via wireless access point. This form of access is very easy to attack to cause a temporary denial of service. I'll open up a terminal window and use Airmon to check my wireless cards interface. I can see that it's wlan0. I'll now put the wireless card into monitoring mode so that it can detect the networks and hosts being used in the local area. This shows that the monitoring device is now enabled as wlan0mon. I'll start it listening to the wireless traffic and see what's active. This display shows me the networks at the top and the clients at the bottom. In the top part the BSSID is the hardware address of the access point. And the service set identification or ESSID is an alphanumeric key up to 32 characters long which identifies the wireless local area network. In the bottom part the station is the MAC address of the client. I've got a remote connection open to my Windows 10 system and I'm running the…

Contents