Author Topic: Ways of jamming  (Read 594 times)

0 Members and 1 Guest are viewing this topic.

Offline khofo

  • EZ's Swashbuckler
  • Knight
  • **
  • Posts: 350
  • Cookies: 25
  • My humor is so black, it could go cotton picking.
    • View Profile
Ways of jamming
« on: April 30, 2014, 03:11:36 pm »
Hey guys, I know that for jamming there is the basic attack where u send deauth packet to the AP and then u create a jam. But is there any other way new routers and other devices can now deviate this attack by creating changing it's mac and leaving the other as a virtual interface where of course the packets reach nothing 
Quote from: #Evilzone
<Spacecow18> priests are bad ppl
<Insanity> Holy crap
Of course God isnt dead. He's out there partying with the Easter Bunny, Santa Clause, Tooth Fairy, and the Man on the moon...
Some of my work: Introduction to Physical Security

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Ways of jamming
« Reply #1 on: May 01, 2014, 06:07:31 pm »
There is no real way of evading this sort of attack since its defined by the protocol itself.
The deauth packet is required for popping a client that offers the wrong challenge.
And even if the method you describe would work it would be childishly easy to defeat.
Nor do I think it would be  practical for the client because eventhough fast roaming does something similar (telling the client where it should hop next) it also knocks out performance.
One would need to change the  protocol itself because it simply is a 802.11x flaw by design.
Too bad there are millions of devices out there that rely on it.
There are many flaws here anyway :)
« Last Edit: May 01, 2014, 06:08:31 pm by proxx »
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage