WLAN deauthentication attack

Solved
Erich_V
Here to help

WLAN deauthentication attack

Over the festive days, I was playing with some ESP32/ESP8266 microprocessors and found an interesting project for deauther WLAN stations and clients with a small snippet of Code, using the deauthentication mechanism in in 802.11 protocol. Without being authorized by an SSID/AP, I was able to attack my home WLAN and a separated part of the Meraki WLAN in my office.

What scared me most is the fact you can buy prebuilt development boards for cheap money. 

 

Is there any possibility to protect the MR devices from such attacks? I didn't found any related Information about this specific Problem in the documentation.

1 Accepted Solution
antonis_sp
Building a reputation

Only solution would be using 802.11w option, in order to enable management frame protetion.

The problem here is that not all devices support this feature.

 

You may find more info here

https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/802.11w_Management_Frame_Protecti...

 

View solution in original post

2 Replies 2
antonis_sp
Building a reputation

Only solution would be using 802.11w option, in order to enable management frame protetion.

The problem here is that not all devices support this feature.

 

You may find more info here

https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/802.11w_Management_Frame_Protecti...

 

Thank you. this really helps.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels