Skip to content

Deauthentication Attack workflow

Just Call Me Koko edited this page Dec 22, 2022 · 5 revisions

Deauthentication Attack workflow

Deauthentication Flood

This attack will broadcast deauthentication frame to all clients connected to a target access point.
The following describes the order of operations necessary to properly execute this attack.

  1. Build list of target access points
    • scanap
      image
  2. Display list of available access points
    • list -a
      image
  3. Select a target access points from the list. Multiple access points may be specified
    • select -a 0,1
  4. Verify access points 0 and 1 have been selected with list
    • list -a
      image
  5. Execute deauthentication flood against the targeted access points
    • attack -t deauth
      image

Targeted Deauthentication Attack

This attack is intended to target only specific stations connected to a targeted access point rather than sending deauth frames to broadcast. Multiple stations and access points can be specified for a single attack. While it is possible to select many stations even when they are associated with different access points, only selected stations associated with selected access points will be targeted. If a station is selected but its associated access point is not, it will not be attacked.
The following describes the order of operations necessary to properly execute this attack.

Clone this wiki locally