Wifi Jammer

Disclaimer

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

1.         Understand how different tools in Linux are used for a range of purposes;

2.         Understand how to configure Airgeddon to perform a Wi-Fi Denial of Service (DoS) attack;

3.         Understand how Wi-Fi DoS attacks work.

 

Hardware Required

Component Number (Peli Case)

(Base) 4 + 5

(Level 1) 6

(Level 1) 3

(Base) 5

(Base) 9

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

Component Number (Box Case)

Slot 1

Slot 12

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case

Alfa Card

USB Cable

Raspbian SD Card

TFT Screen

HDMI Cable

Wireless Keyboard

Wireless Mouse

Power Supply Unit

 

VIDEO GUIDE

 

Conclusion

Remember, attacking a network you don’t have express permission to perform an attack like this is illegal and needs to be done in a safe, contained environment. Most Wi-Fi networks are susceptible to this kind of attack because they have no way to prevent a deauth frame from being processed. Set up your own network with an old router at home that isn’t connected to the internet. Try different types of attacks and see if you can brute force the password of your network, it would also be possible to combine different types of attack that are available within Kali and try and automate these processes using Bash. Explore the 5 stages of “ethical” hacking and try to discover different tools that are used in different stages and different types of attack.