Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Overview
  • How to deauthenticate an client from WIFI?
  • Spacehuhn WIFI Deauther
  1. WIFI Attacks

Deauthentication Attack

PreviousBasic WIFI ManipulationNextWIFI Cracking

Last updated 1 year ago

Overview

A deauthentication (deauth) attack, also known as a deauth attack, is a method used to disrupt or disconnect devices from a Wi-Fi network. It involves sending forged deauthentication packets to one or more devices on the network, causing them to disconnect and lose their network connectivity temporarily.

The deauthentication attack takes advantage of a vulnerability in the Wi-Fi protocol, where any device can send deauthentication packets to other devices on the same network. By spoofing the MAC address of the access point or another authorized device, an attacker can send deauth packets that appear to be coming from the network itself.

The purpose of a deauthentication attack can vary. It can be used for security testing to identify vulnerabilities in a network, for educational purposes to understand the impact of such attacks, or in malicious scenarios to disrupt or harass users on a Wi-Fi network.

How to deauthenticate an client from WIFI?

  • First Step: (select the victim)

first we should select a victim to attack by scanning the available WIFI traffic

sudo airodump-ng [interface]
  • Second Step (Attacking)

sudo aireplay-ng –deauth [#deauth packets] -a [network mac] -c [client mac] [interface]

while last command is running, the victim can't be connected to the network.

Spacehuhn WIFI Deauther

The Spacehuhn Deauther is a small, open-source hardware device that can be used for security assessments of wireless networks. It is designed to interfere with Wi-Fi communications by sending deauthentication frames, which can cause connected devices to disconnect from a Wi-Fi network.

for more information check this part:

Prebuild WIFI Pentesting Tools