WiFi Deauthenticator

Authors

  • Aditya Singh  Department of Computer Science Engineering, Guide, Professor, Department of Computer Science Engineering, Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India
  • Anupam Kumar  Department of Computer Science Engineering, Guide, Professor, Department of Computer Science Engineering, Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India
  • Yagyansh Sharma  Department of Computer Science Engineering, Guide, Professor, Department of Computer Science Engineering, Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India
  • Aditya Sawnat  Department of Computer Science Engineering, Guide, Professor, Department of Computer Science Engineering, Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India
  • Prof. Pallavi Bhaskare  Department of Computer Science Engineering, Guide, Professor, Department of Computer Science Engineering, Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT228341

Keywords:

MAC Address ,De-Authentication Attacks, airmon-ng, MDK3

Abstract

As the internet attack rate of the world is having trajectory growth at a significant pace; IEEE 802.11 wireless networks have emerged as a critical branch of security. These days wireless networks are literally on every corner from cafes to airport terminals. Over the years, lots of flaws on wireless systems are discovered ranging from caffe latte attacks to KRACK attacks. Together with these, DOS is not an exception. This paper stays around the Wifi DOS attack and practical detection of it. While Wifi DOS attack is an attack on wireless systems which completely disrupts the connection between Access Point and clients (cell phones, laptops ). While some network equipment have built in features to prevent this attack; their performance, effectiveness to defend against this attack is not impressive at all. Consequently, along this whitepaper we will have a fascinating journey to witness how combination of packet crafting skills in scapy and python scripting will assist us to detect this attack.

References

  1. Stuart Compton, Charles Hornat. May 17th 2007 802.11 Denial Of Service Attacks and Mitigation. SANS Institute InfoSec Reading Room.
  2. Asier Martinez, Urko Zurutuza, Roberto Uribe Etxebarria, Miguel Fernandez, Jesus lizarraga, Ainhoa Serna and Inaki Velez 4-7th March 2008 Beacon frame Spoofing Attack Detection in IEEE 802.11 Networks. In the proceedings of the third international conference on Availability, Reliability and Security (ARES08). Barcelona.
  3. Joshua Wright Jan 21, 2003 Detecting wireless LAN MAC Address spoofing. GCIH, CCNA, pp 1-5.
  4. Chintan Kamani, Dhrumil Bhojani, Ravi Bhagyoday, Vivek Parmar, Deepti Dave . February 2019, Deauthentication Attack on Wireless Network. International Journal of Engineering and Advanced Technology (IJEAT)
  5. Rupinder Cheema, Divya Bansal, Dr. Sanjeev Sofat. June 2011 Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks. International Journal of Computer Application

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Aditya Singh, Anupam Kumar, Yagyansh Sharma, Aditya Sawnat, Prof. Pallavi Bhaskare, " WiFi Deauthenticator, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.142-146, May-June-2022. Available at doi : https://doi.org/10.32628/CSEIT228341