Skip to content

๐Ÿ›ก๏ธ Deauth Attacks

Gr edited this page Dec 4, 2024 · 1 revision

BLEShark Nano - Deauth Attack Guide ๐Ÿ›ก๏ธ

Learn how to execute Wi-Fi deauthentication attacks with your BLEShark Nano for network testing and security analysis.

โ“ What is a Deauth Attack?

A deauthentication (deauth) attack disconnects devices from a Wi-Fi network by sending false "deauth" packets to the network. This feature is intended for security professionals to test Wi-Fi vulnerabilities or troubleshoot network issues.

๐Ÿ› ๏ธ How to Use the Deauth Attack App

The BLEShark Nano includes a dedicated app for executing deauth attacks. Follow these steps to get started:

๐Ÿ“‹ Step-by-Step Instructions:

  1. Open the "Deauth" app from the Wi-Fi menu.
  2. The BLEShark Nano will scan for nearby Wi-Fi networks and display them in a horizontal list.
  3. Press [S] to select and begin preforming the deauth attack on all devices under the Wi-Fi AP!
  4. Monitor the process on the OLED screen. The app will display the number of packets sent.

โš™๏ธ Customization

Packet Rate Adjustment

Customize the deauth packet rate to optimize performance or reduce detection risks (available under extra settings mode):

  • High Rate: Maximum disruption but higher chance of detection.
  • Low Rate: Slower attack with stealthier execution.

๐Ÿšจ Legal Disclaimer

Deauthentication attacks should only be performed in controlled environments where you have explicit permission to test. Unauthorized use of this feature is strictly prohibited and may result in severe penalties. Always follow ethical guidelines and local laws.

๐ŸŒŸ Use Cases

  • Testing the security and resilience of your Wi-Fi network.
  • Demonstrating vulnerabilities in a professional pentesting environment.
  • Identifying unauthorized devices on your network.

๐ŸŒ Supported Standards

The BLEShark Nano supports deauth attacks on networks using the following Wi-Fi standards:

  • 802.11b
  • 802.11g
  • 802.11n