Advanced Wi-Fi attacks using commodity hardware

  title={Advanced Wi-Fi attacks using commodity hardware},
  author={Mathy Vanhoef and F. Piessens},
  booktitle={ACSAC '14},
  • Mathy Vanhoef, F. Piessens
  • Published in ACSAC '14 2014
  • Computer Science
  • We show that low-layer attacks against Wi-Fi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs… CONTINUE READING
    72 Citations
    Denial of Service Attacks Against the 4-Way Wi-Fi Handshake
    • 6
    • PDF
    Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing
    • 12
    • PDF
    Characterizing Wi-Fi Man-In-the-Middle Attacks
    • PDF
    Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi
    • S. Gong, H. Ochiai, H. Esaki
    • Computer Science
    • 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
    • 2020
    Key Reinstallation Attacks : Breaking the WPA 2 Protocol
    • 3
    • PDF
    Truncate after preamble: PHY-based starvation attacks on IoT networks
    • 1
    • PDF
    Dragonblood: A Security Analysis of WPA3's SAE Handshake
    • 12
    • PDF