How to kill "that" access point::: DoS using Airjack tools (wlan_jack)
Author : LogNight a.k.a Josua M Sinambela
The author is not liable for any actions that will be done by anyone
who try to practice or perform the attack because of reading this article so
causing loss of someone or some institution. Oks Use your own risk.
Tutorial and demo was written to complement the discussion on the mailing list jogja-wireless@yahoogroups.com regarding the use of tools airjack. Airjack is one of the tools used wardriving by the crackers to perform actions such as MITM (Man In The Middle) attack and DoS (Denial Of Services). This time the author will explain the step-ledge to conduct DoS attacks on an Access Point, while for the attack MITM attack will be described on the next episode :)
Airjack only works on chipset prism pcmcia wireless card. Airjack actually a module or drivers that are used in the Linux kernel so that wireless cards can be used, as well as like wlan-ng, hostap, etc Orinoco. Privileged Airjack module we will discuss this time is able to perform DoS on APs by using the MAC (BSSID), an Access Point (usually AP MAC of the target) and make the delivery frame frame deauthentikasi continuously to broadcast address or to a certain mac address from the AP so that the client is unable to perform re-associate (try to connect again). As a result of client-client who was able to connect network through the Access Point will be disconnected.
Please note that the driver airjack only be used on the Linux operating system with kernel 2.4.x As for equipment or hardware tools used by the writer in the discussion below is Dell Latitude C400 laptop with Mandrake Linux 10.0 kernel 2.4.27, PCMCIA Wireless Card Samsung SWL-2100N 8002 chipset nic Prism2 Intersil firmware sta pri 0.3.0 1.7.1 (after I upgrade from sta 0.8.0), USB Wireless Senao NL2511UB4, Access Point Compex WP11B as a target, PC Desktop as a client
More : http://www.ziddu.com/download/1903401/DoSAirjack.pdf.html
Courtesy : http://adekrina.blogspot.com/2008/08/how-to-kill-that-ap.html