lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 15 May 2004 20:27:14 -0500 From: Jason Ostrom <jpo@...ox.com> To: Casper Dik <casper@...land.sun.com> Cc: albatross@....it, bugtraq@...urityfocus.com Subject: Re[2]: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices I wasn't there, but I know the Deauth Flood attack [1] is a very effective attack that most 802.11b networks are vulnerable to. In security testing, it is trivial to use a Prism2 based card with the HostAP drivers and flip your wireless NIC into an AP, spoof the BSSID of the AP station, and flood the wireless clients with deauth frames - legitimate traffic never passes as a result. Reyk Floeter's Void11 Penetration testing tools implement this attack [2]. I saw this attack mentioned in at least one book, but I don't know why it wasn't released as a vulnerability. It is similar to the released vulnerability, but involves spoofed frames instead of the physical layer. [1] Aruba Networks "Thwarting DoS Attacks" http://www.arubanetworks.com/products/whitepapers/secure-wireless/index.php?pg=3 ` [2] WLSec Projects http://www.wlsec.net/projects/ Casper Dik> In last year's Usenix security symposium an attack which Casper Dik> looked very much like one in the first Casper Dik> paragraph was performed Casper Dik> agains tthe audience (immediate linkloss was the result of the Casper Dik> presenter pressing a button on his laptop). Casper Dik> This was with with plain COTS components, so what is different Casper Dik> with this attack or is it the same attack rediscovered? Casper Dik> I don't remember it getting any press. Casper Dik> Casper
Powered by blists - more mailing lists