wifi jammer, is a tool that blocks all wifi clients and access points within range. The effectiveness of this script is limited by your wireless card. Alfa cards actually seem to get stuck in a block radius with high saturation of the access point. The granularity is given in the options for more effective targeting.
Now it will find the most powerful wireless interface and activate the monitor mode. If a monitor mode interface is already in place, it will use the first one it finds instead. It will then start to skip channels 1 per second from channels 1 to 11 sequentially, identifying all access points and clients connected to these access points. On the first pass through all wireless channels, it identifies only the targets. After that, the time limit of 1 s per channel is eliminated and the channels are hoisted as soon as the deauth packets have finished sending.
Note that it will always add clients and access points as it finds them after the first pass.
Going to a new channel, it will identify the targets that are on this channel and send 1 packet of deauth to the client from the access point, 1 starting point to the client access point and 1 point to the d access to the mailing address. clients connected to the AP. Many access points ignore deauths to broadcast addresses.
Terminology is something that mixes us all at one time. [Seytonic] does a great job of explaining the difference between WiFi jammers and detectors in the embedded video below. Many of you will already know the difference, but it’s worth pointing out the difference since many people call deauth devices “WiFi Jammers”.
In their video on YouTube, they continue to explain that jammers essentially throw a noise load on all WiFi channels making the frequencies unusable at a given distance from the jammer. Jammers are normally quite expensive, mostly illegal, and therefore hard to find unless of course you build your own.
WiFi authentication works in a different way. WiFi sends unencrypted data packets called management frames. Because these are unencrypted, even if the network is using WPA2, malicious parties can send authentication commands that take users out of an access point. However, there is hope with 802.11w which encrypts management frameworks. It has been around for a while, but manufacturers don’t seem to bother or implement it, although it would improve the security of a WiFi device from these types of attacks.