[oe-issues] [Bug 1939] New: Void11
bugzilla-daemon at tinman.treke.net
bugzilla-daemon at tinman.treke.net
Sun Mar 4 18:28:17 UTC 2007
http://bugs.openembedded.org/show_bug.cgi?id=1939
Summary: Void11
Product: Openembedded
Version: unspecified
Platform: All
URL: http://www.wirelessdefence.org/Contents/Void11Main.htm
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: Distributions
AssignedTo: openembedded-issues at lists.openembedded.org
ReportedBy: r.farina at adelphia.net
QAContact: tinderbox-oe at gmx.net
"Void11 a free implementation of some basic 802.11b attacks." -www.wlsec.net
NOTE: Void11 only works with the hostap driver (e.g. the Prism card)
Void11 Attacks:
Void11 offers three attack mechanisms:
Deauthenticate Clients (default mode):
*Floods the WLAN with deauthentication packets - authenticated clients will
drop their network connections.
Authentication Flood:
*Floods access points with authentication packets (random client MACs),
results depend on equipment manufacturer.
Association Flood:
*Floods access points with association packets (random client MACs),
results depend on equipment manufacturer.
--
Configure bugmail: http://bugs.openembedded.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the Openembedded-issues
mailing list