Figure 3: Authentication attack. Host follows standard Authentication/Association sequence. Access point terminates session after deauthentication from attacking host.

Back to Article