Beacon Frame Flooding
Jump to navigation
Jump to search
Summary
This documentation provides an overview of Beacon Frame Flooding attacks, a form of Denial-of-Service (DoS) targeting wireless networks by overloading them with spoofed beacon frames. It discusses how these attacks are implemented, their impact, and detection and mitigation techniques.
Requirements
- Operating system: Linux-based distributions with support for monitor mode (e.g., Ubuntu 20.04).
- Software tools: MDK4, Aircrack-ng
In order to complete these steps, you must have followed Hak5 Signal Owl: before.
Description
Step 1
Understanding Beacon Frames
Beacon frames are management packets broadcast by wireless access points (APs) to announce their presence. These frames include:
SSID (network name). BSSID (AP MAC address). Channel and frequency details. Security protocol indicators (e.g., WPA2, WPA3).
Step 2
- Enable monitor mode on the wireless network adapter:
airmon-ng start wlan0
- Execute MDK4 to generate spoofed beacon frames:
mdk4 wlan0mon b -a -m -s 500
- Observe the impact on the surrounding wireless environment.
Used Hardware
Hak5 Signal Owl: Device for automated pentesting tasks.