web_interface/attack.html
INFO:
stopreload
| Attacks | Targets | Pkts/s | START / STOP |
|---|---|---|---|
| Deauth | 0 | 0/0 | START |
| Beacon | 0 | 0/0 | START |
| Probe | 0 | 0/0 | START |
| All Pkts/s: | 0 |
Closes the connection of WiFi devices by sending deauthentication frames to access points and client devices you selected.
This is only possible because a lot of devices don't use the 802.11w-2009 standard that offers a protection against this attack.
Please only select one target! When you select multiple targets that run on different channels and start the attack, it will quickly switch between those channels and you have no chance to reconnect to the access point that hosts this web interface.
Beacon packets are used to advertise access points. By continuously sending beacon packets out, it will look like you created new WiFi networks.
You can specify the network names under SSIDs.
Probe requests are sent by client devices to ask if a known network is nearby.
Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID list.
It's unlikely you will see any impact by this attack with your home network.