Up to this point, you have seen various sniffing techniques that gather information. In this section, you'll see how wireless attacks take place, which is a very important topic in pentesting.
Wireless attacks
The deauthentication (deauth) attack
Deauthentication frames fall under the category of the management frames. When a client wishes to disconnect from the AP, the client sends the deauthentication frame. The AP also sends the deauthentication frame in the form of a reply. This is the normal process, but an attacker takes advantage of this process. The attacker spoofs the MAC address of the victim and sends the deauth frame to the AP on behalf of the victim; because of this, the connection to the client is dropped...