📕
Blog
  • 🐞Vulnerabilities & Techniques
    • Web Vulnerabilities
      • Open Redirect
      • HTTP Parameter Pollution (HPP)
      • Host Header Injection (HHI)
      • XSS
      • HTML-Injection
      • clickjacking
      • S3
      • EXternal Xml Entity (XXE)
      • XSS prevention | CSP
      • DOM-XSS
      • SQL Injection | SQLI
      • Response Manipulation Technique & How Burp Suite Works
    • API Vulnerabilities
      • Mass Assignment Vulnerability
  • 🚩CTF
    • ASCWG
  • ✍️Writeups
    • Read Writeups
      • REST API WriteUps
      • Web Vulnerabilities WriteUps
    • Technical Writeups
      • Reset Password Poisoning Via Host Header Injection Lead to (ATO)
      • OTP/2FA Bypasses
        • OTP bypasses
  • 😈TryHackMe
    • THM Advent of Cyber 3 (2021) NoSQL WriteUp
  • 🔱Web-CyberTalents
    • CyberTalents-Web-Easy
    • CyberTalents-Web-Medium
    • CyberTalents-Web-Hard
  • 🖇️Pentesting & Bug Hunting Tips
    • ATO Via Host Header Injection
    • OTP Bypass
    • OutLook Plugin Pentest Guide
  • 💻Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
      • DOM XSS in the document.write sink using source location.search
      • Lab: DOM XSS in document.write sink using source location.search inside a select element
      • Lab: DOM XSS in innerHTML sink using source location.search
      • Lab: DOM XSS in jQuery anchor href attribute sink using location.search source
      • Lab: Reflected DOM XSS
      • Lab: Stored DOM XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • 🛜Wireless Networks Penetration Testing
  • ⚔️Wi-Fi Attacks
    • 🕸️Network Scanning attack
    • 🌊DOS / Flooding
      • 1️⃣DoS - Frame Flooding (Deauth, EAPOL, Beacons)
      • 2️⃣DoS- Exploiting Countermeasures (MIC failure)
    • Jamming Attacks (هجمات التشويش)
    • Probe Requests Attack
    • Handshake Attacks
      • Dictionary Attack
      • Clientless Attack
      • KRACK Attack
      • Downgrad Attack
    • Rouge AP Attack
  • Lab Notes
  • RFID and NFC
  • Bluetooth
  • ZigBee
  • Google Map Test
Powered by GitBook
On this page
  1. Wi-Fi Attacks
  2. DOS / Flooding

DoS - Frame Flooding (Deauth, EAPOL, Beacons)

PreviousDOS / FloodingNextDoS- Exploiting Countermeasures (MIC failure)

Last updated 11 months ago

Management framd flood (Unencrypted):

Management frames are a specific type of frame in a WiFi network that are used for the management and control of wireless communication. They play a crucial role in the functioning and organization of WiFi networks by facilitating tasks such as network discovery, authentication, association, and periodic communication between network devices.

Here are the main types of management frames in a WiFi network:

  1. Beacon Frames: Beacon frames are broadcasted periodically by WiFi access points (APs) to announce their presence and provide information about the network, such as the SSID (network name), supported data rates, security settings, and other parameters. Devices use beacon frames to discover and connect to available networks.

  2. Probe Request/Response Frames: When a WiFi device wants to find and connect to a specific network, it sends out probe request frames. These frames include the SSID of the network the device is looking for. Access points within range respond with probe response frames containing information about the network, allowing the device to decide which network to join.

  3. Authentication Frames: Authentication frames are used in the process where a WiFi device authenticates itself with the network. There are two types of authentication frames:

    • Authentication Request: Sent by a WiFi device to request access to the network.

    • Authentication Response: Sent by the access point to confirm or deny the authentication request.

  4. Association Frames: Once a device is authenticated, it sends an association request frame to request association with a specific AP. The AP responds with an association response frame to either accept or reject the association request. Upon successful association, the device can then communicate with the network.

  5. Deauthentication Frames: Deauthentication frames are used to terminate a device's association with the network. They can be sent by either the access point or the device itself to signal the end of an authenticated session.

Management frames are essential for the proper functioning and organization of WiFi networks. They enable devices to discover networks, authenticate and associate with access points, and maintain connectivity. However, because they are fundamental to network management, management frames can also be targeted in various types of attacks, such as WiFi Frame Flooding attacks, which aim to disrupt network operations by overwhelming it with excessive management frame traffic.


De-Authentication:

A deauth or de-authentication attack disrupts connections between users and Wi-Fi access points. The attackers force devices to lose access and then reconnect to a network they control. Then, perpetrators can capture login details or trick users into installing rogue programs. Learn more about how de-authentication attacks work and how you can mitigate their impact.

Essentially, a de-authentication attack works through the following steps:

  1. Perpetrators spoof MAC addresses and send de-authentication frames, forcing the client offline.

  2. If attackers continue sending forged frames after they terminate connections, users won’t be able to reconnect. While the attack could focus on a single target, it might also jam the wireless networks. Thus, all connected clients go offline.


DOS/EAPOL Flood:

هو ال frame المسؤول عن عملية ال authentication

هبعت عدد كبير من ال authentication requests ال radius server أو ال Access Point مش هيكون قادر إنه يتعامل مع العدد الكبير دهه وبالتالي أي حد بيحاول يتصل على الشبكه مش هيكون قادر على القيام بعملية الإتصال دي ودهه بيوصلنا لحجب الخدمه ال DOS عن كل ال clients


DOS/Beacons Flood إتكلمنا في المقدمه إن كل أكسيسز بوينت بيبعت عدد من البيكونز بيعرف عن نفسه في المكان بإسم الشبكه ونوع التشفير المستخدم هنا الأتاكر بيقدر إنه يكريت عدد كبير جدا من أسماء الشبكات عشان يمنع المستخدمين من سهولة الإتصال

Example:

في عدد كبير جدا من الشبكات الي بتبعت Beacons ل Clients في الحالة دي مش هيقدروا يعملوا اتصال على أي شبكه لانه هيكون مش معروف اي شبكه هي الأصلية

Some Wi-Fi networks do not have effective mechanisms for verifying .

Attackers can set up rogue networks or mimicking legitimate access points so they can watch victims’ traffic. This surveillance covers all communications, visited websites, and financial transactions.

⚔️
🌊
1️⃣
MAC addresses
evil twins