-
Notifications
You must be signed in to change notification settings - Fork 5
๐ก๏ธ Deauth Attacks
Learn how to execute Wi-Fi deauthentication attacks with your BLEShark Nano for network testing and security analysis.
A deauthentication (deauth) attack disconnects devices from a Wi-Fi network by sending false "deauth" packets to the network. This feature is intended for security professionals to test Wi-Fi vulnerabilities or troubleshoot network issues.
The BLEShark Nano includes a dedicated app for executing deauth attacks. Follow these steps to get started:
- Open the "Deauth" app from the Wi-Fi menu.
- The BLEShark Nano will scan for nearby Wi-Fi networks and display them in a horizontal list.
- Press [S] to select and begin preforming the deauth attack on all devices under the Wi-Fi AP!
- Monitor the process on the OLED screen. The app will display the number of packets sent.
Customize the deauth packet rate to optimize performance or reduce detection risks (available under extra settings mode):
- High Rate: Maximum disruption but higher chance of detection.
- Low Rate: Slower attack with stealthier execution.
Deauthentication attacks should only be performed in controlled environments where you have explicit permission to test. Unauthorized use of this feature is strictly prohibited and may result in severe penalties. Always follow ethical guidelines and local laws.
- Testing the security and resilience of your Wi-Fi network.
- Demonstrating vulnerabilities in a professional pentesting environment.
- Identifying unauthorized devices on your network.
The BLEShark Nano supports deauth attacks on networks using the following Wi-Fi standards:
- 802.11b
- 802.11g
- 802.11n