[oe-issues] [Bug 1939] New: Void11

bugzilla-daemon at tinman.treke.net bugzilla-daemon at tinman.treke.net
Sun Mar 4 18:28:17 UTC 2007


http://bugs.openembedded.org/show_bug.cgi?id=1939

           Summary: Void11
           Product: Openembedded
           Version: unspecified
          Platform: All
               URL: http://www.wirelessdefence.org/Contents/Void11Main.htm
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: Distributions
        AssignedTo: openembedded-issues at lists.openembedded.org
        ReportedBy: r.farina at adelphia.net
         QAContact: tinderbox-oe at gmx.net


"Void11 a  free implementation of some basic 802.11b attacks." -www.wlsec.net

NOTE: Void11 only works with the hostap driver (e.g. the Prism card)

Void11 Attacks:
Void11 offers three attack mechanisms:

Deauthenticate Clients (default mode):
    *Floods the WLAN with deauthentication packets - authenticated clients will
drop their network connections.

Authentication Flood:
    *Floods access points with authentication packets (random client MACs),
results depend on equipment manufacturer.

Association Flood:
    *Floods access points with association packets (random client MACs),
results depend on equipment manufacturer.


-- 
Configure bugmail: http://bugs.openembedded.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the Openembedded-issues mailing list