Description: Short video demonstrating a python script I put together in order to fill an Access Points client table. The python script makes use of the ability to fake authenticate with a Access Point using WEP as an encryption method. It sends a number of fake authentication requests (specified by the user) to the access points using random mac addresses, thus fill the table not allowing any clients to connect.
This was done as one of the exercises from "Backtrack 5 Wireless Penetration Testing"
The code is within the youtube description for you to play with! :)
Tags: Wireless , Aircrack , Python. ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.