What is the concept behind interference? These devices have an oscillator or signal generator, which allows us to amplify the signal through the antenna to achieve greater coverage. We need to find a signal that resonates with the carrier frequency we want to interfere with to prevent information transmission. Depending on the antenna used, the device may range from a few meters to several kilometers.
The jammer used during the demonstration was used to interfere with signals in the 2.4 GHz band. This band is called ISM and covers unprotected spectrum that can be used without permission. Protocols such as WiFi or Bluethoot actually work in this frequency band.
How do we use security issues
As we all know, WiFi uses 11 channels to operate. Each channel has a center frequency, so these portable jammer will try to interfere with frequencies between 2402 GHz and 2483 GHz.
Now, for safety reasons, the interesting thing about using these devices is. Three points were analyzed in the dialogue:
1. Can be used to prevent Roguer AP in enterprise environment. This is nothing more than preventing third parties from generating WiFi connection points via Internet connections (eg from their mobile devices).
2. Avoid information leakage through wireless data transmission, so that data exchange can be carried out abroad.
3. Delete “malicious twins” on unauthenticated networks. In this way, we can only keep a few communication channels up and running, which limits the possibility of generating malicious networks to deceive our users.
It is very important to warn that these devices may restrict or even prohibit the use of these devices in some countries. Therefore, it is important to seek advice in any case, so as not to ignore the applicable regulations in various countries.
Can you imagine another way we can use jammers to provide security?