From 2622d4dd11391c50a6720f10d0bb743025eec07e Mon Sep 17 00:00:00 2001 From: Stefan Kremser Date: Sat, 12 Aug 2017 11:27:20 +0200 Subject: [PATCH] added video: difference deauthing and jamming --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index db92687..443d9f5 100644 --- a/README.md +++ b/README.md @@ -39,6 +39,8 @@ With this software flashed onto it, you can select a target network and start di The deauth attack will, if the connection is vulnerable, disconnect the devices from the network. Because the attack is running constantly, the devices will be disconnected again and again. Depending on the network, that can either block a connection or slow it down. +**The difference between deauthing and jamming:** [WiFi Jammers vs Deauthers | What's The Difference?](https://www.youtube.com/watch?v=6m2vY2HXU60) + Other attacks also have been implemented, such as beacon and probe request flooding. The deauth attack works by exploiting an old and known vulnerability in the 802.11 Wi-Fi protocol.