1 00:00:00,270 --> 00:00:06,450 Hi and welcome in this video, I'm going to teach you how to perform a denial of service attack on a 2 00:00:06,450 --> 00:00:08,100 wireless access point. 3 00:00:08,970 --> 00:00:12,210 First of all, let's understand what is a denial of service. 4 00:00:12,210 --> 00:00:21,000 Attack is an attack meant to shut down a system or server by denying users to access a service or website. 5 00:00:21,840 --> 00:00:27,690 So I will switch to my calling machine and put my wireless card into monitor mode. 6 00:00:28,380 --> 00:00:34,080 Using the following command airman NGOs started Zululand zero. 7 00:00:34,830 --> 00:00:44,730 Now I want to scan all the access points in range using Arrow Dom and GW Line Zero Man to stop the scanning 8 00:00:44,730 --> 00:00:48,870 use control plus see and then select your network. 9 00:00:49,230 --> 00:00:57,720 My is Konate, so I'm going to need the Mac address of the access point and the channel then type error 10 00:00:57,730 --> 00:01:02,910 Dom and G Channel six and the backside of the router. 11 00:01:03,690 --> 00:01:07,590 This will show you the clients that are connected to the access point. 12 00:01:08,460 --> 00:01:17,430 Now I will perform the actual attack with AirPlay and G Dash zero and the number of packets and Dash 13 00:01:17,430 --> 00:01:21,330 A and then the Mac address of the access point. 14 00:01:22,350 --> 00:01:24,000 Now press enter. 15 00:01:24,510 --> 00:01:30,930 This attack will disconnect everyone from the network, so I will switch to my Windows machine. 16 00:01:31,290 --> 00:01:39,000 And as you can see in my taskbar, shows that I am connected and you can see now that I have lost my 17 00:01:39,000 --> 00:01:39,870 connection. 18 00:01:40,680 --> 00:01:47,280 If you want to have a little more fun, you could create fake routers that basically flood your options 19 00:01:47,760 --> 00:01:50,040 when you search for a network to connect. 20 00:01:51,060 --> 00:01:59,160 First, I'm going to flood my local area with random fake wireless routers, so I'm going to use my 21 00:01:59,310 --> 00:02:08,130 kW LAN zero more beat, which is a beacon flood and use Channel five by dashi and press enter. 22 00:02:08,670 --> 00:02:14,290 And if you look, it's flooding with these fake names right here now to show that it's working. 23 00:02:14,310 --> 00:02:21,450 I'm going to click on my wireless taskbar and you can see it showing these random wireless networks. 24 00:02:22,140 --> 00:02:28,110 You can also change the names for the routers by using a simple file with some names. 25 00:02:28,770 --> 00:02:36,810 So after the dashi type Dash F, which means the computer is going to use a file to generate these names 26 00:02:36,960 --> 00:02:39,300 instead of random characters. 27 00:02:40,020 --> 00:02:45,300 So I'm going to drag and drop the file in here and press enter. 28 00:02:45,900 --> 00:02:50,550 Now again, I'm going to go to my taskbar and show that it's working. 29 00:02:51,210 --> 00:02:57,720 But if someone tries to connect to these networks, it's not going to work because the purpose of this 30 00:02:57,720 --> 00:03:00,030 is just to flood your options. 31 00:03:00,690 --> 00:03:02,700 So that's it for this lesson. 32 00:03:03,060 --> 00:03:05,910 Thanks for watching, and I'll see you next time.