this post was submitted on 20 Jul 2024
738 points (99.3% liked)
Technology
60008 readers
3800 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I would think most wifi jamming is just deauth attacks. It is much easier to just channel hop, enumerate clients, and send them deauthentication packets.
This way you don't need a particularly powerful radio/antenna, any laptop/hacking tool with Wi-Fi is all you need. There are scripts out there that automate the whole thing, so almost no deep knowledge of wifi protocols are required.
WPA3 has protected management frames to protect against this but most IoT cameras probably don't support WPA3 yet.
That's a relatively sophisticated attack though, and like you said is dependent on versions of WPA. It's easier from a hardware perspective but more complicated software.
A 2.4 and 5ghz jammer is just simpler. Turn it on, everything fails. Even stuff that doesn't talk Wi-Fi like Zigbee. Throw 400 and 900mhz on there too and now even residential security sistems will be frozen. It's just simpler to use brute force for something like this.