In this recipe we are going to take a look at spoofing beacon frames. Now that we have seen what a beacon frame actually looks like, and some of the properties of a beacon frame, we can kind of understand the value of forging a beacon frame and how that might be employed to affect the availability of a wireless network or access point specifically.
After examining the contents of the beacon frame, we could see that important information such as the sinking of time, the identification of a network, as well as other properties are contained within this vital frame. If an attacker wants to disrupt the operation of a wireless network, such as slowing the network down or making the network unavailable, a beacon frame is an ideal place to undertake this action.
It is important to know upfront what makes the spoofing of a beacon frame possible. An acceptable form...