Wireless networks establish their connection using relatively simple connection techniques. In this video, learn how an attacker can cause a station on a wireless network to lose its connection.
- [Instructor] Home users and many business users … are connected to their networks via wireless access point. … This form of access is very easy to attack … to cause a temporary denial of service. … I'll open up a terminal window and use Airmon … to check my wireless cards interface. … I can see that it's wlan0. … I'll now put the wireless card into monitoring mode … so that it can detect the networks and hosts … being used in the local area. … This shows that the monitoring device … is now enabled as wlan0mon. … I'll start it listening to the wireless traffic … and see what's active. … This display shows me the networks at the top … and the clients at the bottom. … In the top part the BSSID … is the hardware address of the access point. … And the service set identification or ESSID … is an alphanumeric key up to 32 characters long … which identifies the wireless local area network. … In the bottom part the station … is the MAC address of the client. … I've got a remote connection open to my Windows 10 system …
- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks