Figure 3:
Authentication attack. Host follows standard Authentication/Association sequence. Access point terminates session after deauthentication from attacking host.
Back to Article