Page 2 of 2 FirstFirst 12
Results 11 to 13 of 13

Thread: Defending against aireplay-ng deauthentication

  1. #11
    Good friend of the forums
    Join Date
    Jun 2008
    Posts
    425

    Default

    No it would not help since the de-authentication packet is sent to the AP, which consequently disconnects the client after receiving it. A MAC filter would make sure that all packets from non legitimate sources are disregarded, but would be easy enough to circumvent by faking ones MAC address.
    Would useing ip filters on the AP stop de-auth or is it to high up the stack.
    If it would, on open source APs could you upload knockd to the ap.

  2. #12
    Member imported_Deathray's Avatar
    Join Date
    Oct 2007
    Posts
    381

    Default

    Without being to experienced in wifi, I am learning about the OSI model in my cisco classes. I think a deauthentication packet is in reality a frame, occuring at layer 2 (data-link layer). So I don't believe that is possible.
    - Poul Wittig

  3. #13
    Good friend of the forums
    Join Date
    Jun 2008
    Posts
    425

    Default

    Hi, has any one got the technology to work out if the de-auth is recived by the ram or the rom?, thanks andy

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •