
While these script-kiddie attacks can be very disruptive, they can also be detected by a variety of free and open-source tools. Don't Miss: Disable Security Cams on Any Wireless Network with Aireplay-ng.Doing so requires only a wireless network adapter which can be put into monitor mode, and a simple command can take out an entire channel with many networks operating on it for up to a block without any specialized equipment. Most common scripts like Aireplay-ng or MDK3 do this by flooding a target with deauthentication or disassociation packets, which are both normal-seeming packets which have a disruptive effect on the network. Tools to do this are free, widespread, and well-documented on the internet, all perfect for script kiddies.

Because the management packets that devices use to control these connections are unencrypted, it's easy for an attacker to craft fake ones after sniffing the wireless channels nearby.

Most denial-of-service (DOS) attacks are pretty basic and take advantage of well-documented flaws in the way WPA networks manage connections.

We'll use Wireshark to discover a Wi-Fi attack in progress and determine which tool the attacker is using. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets.
