
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 2: IDS—Denial of Service Attack
51
Figure 2-20: Attacker spoofs invalid authentication requests from
associated client station to trick the AP into disassociating the
associated client.
A form a DoS attack spoofs invalid authentication request frames
(with bad authentication service and status codes) from an associated
client in
State 3
to an AP. Upon reception of the invalid
authentication requests, the AP would update the client to
State 1
,
which disconnects its wireless service.
FATA-jack is one of the commonly used tools to run a similar attack.
It is a modified version of WLAN-jack and it sends authentication-
failed packets along with the reason code of the previous
authentication failure to the wireless station. It does this after it
spoofs the MAC address of the Access point. FATA-jack closes most
active connections and at times forces the user to reboot the station to
continue normal activities.
Laptop Wireless LAN Policy Reference Guide.book Page 51 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...