^.^;

Wi-Fi Deauthentication Attack

Master wireless deauthentication attacks. Force disconnect clients from access points to capture WPA/WPA2 handshakes for offline cracking.

IntermediateInteractive Simulation

What is Wi-Fi Deauthentication?

Wi-Fi deauthentication is a wireless attack that exploits management frames in the 802.11 protocol. These frames are unencrypted and unauthenticated, allowing attackers to forge deauth packets that forcibly disconnect clients from access points. This technique is commonly used for denial of service attacks or to capture WPA/WPA2 handshakes for offline password cracking.

Attack Methodology

1. Monitor Mode Setup

Enable monitor mode on wireless adapter to capture all wireless traffic

airmon-ng start wlan0

2. Target Identification

Scan for access points and connected clients using airodump-ng

airodump-ng wlan0mon

3. Deauth Attack Execution

Send forged deauth frames to disconnect clients

aireplay-ng -0 10 -a [AP_MAC] -c [CLIENT_MAC] wlan0mon

4. Handshake Capture

Capture WPA handshake when client reconnects for offline cracking

Attack Types

🎯 Targeted

Deauthenticate a specific client to capture their handshake

📡 Broadcast

Disconnect all clients simultaneously from an access point

🔁 Continuous

Maintain persistent denial of service by repeatedly deauthing

Defensive Measures

  • Implement 802.11w (Management Frame Protection) to encrypt management frames
  • Use WPA3 which includes mandatory MFP support
  • Deploy wireless intrusion detection systems (WIDS) to detect deauth floods
  • Monitor for abnormal disconnection patterns and high deauth frame rates
  • Use strong WPA2/WPA3 passwords resistant to offline cracking

⚠️ Legal Notice

Performing deauthentication attacks on networks without explicit authorization is illegal in most jurisdictions. This tool is for educational purposes only. Always obtain written permission before conducting wireless security assessments.

Nearby Access Points

CoffeeShop_WiFi
Ch 6
BSSID: A4:5E:60:E2:3F:10 | Signal: -45 dBm
2 clients
HomeNetwork_5G
Ch 36
BSSID: B6:7F:81:D3:4A:21 | Signal: -55 dBm
1 clients
Corp_Guest
Ch 11
BSSID: C8:9A:92:F4:5B:32 | Signal: -60 dBm
3 clients

Deauth Attack Control

Select an access point to begin

Packet Monitor

No activity yet...

Captured Handshakes (0)

No handshakes captured yet

Deauth clients to force reconnection

Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2025 JMFG. All rights reserved.