802.11 Management Frame Setting

Clicking the check boxes enables/disables the monitors, all of which are enabled by default:

 

Total Management Threats

Displays the total number of management threats.

Management Frame Flood

This variation on the DoS attack attempts to flood wireless access points with management frames (such as association or authentication requests) filling the management table with bogus requests.

Null Probe Response

When a wireless client sends out a probe request, the attacker sends back a response with a Null SSID. This response causes many popular wireless cards and devices to stop responding.

Broadcasting De‑authentication

This DoS variation sends a flood of spoofed de-authentication frames to wireless clients, forcing them to constantly de-authenticate and subsequently re-authenticate with an access point.

Valid Station With Invalid SSID

In this attack, a rogue access point attempts to broadcast a trusted station ID (ESSID). Although the BSSID is often invalid, the station can still appear to clients as though it is a trusted access point. The goal of this attack is often to gain authentication information from a trusted client.

Wellenreiter Detection

Wellenreiter and NetStumbler are two popular software applications used by attackers to retrieve information from surrounding wireless networks.

Ad-Hoc Station Detection

Ad-Hoc stations are nodes which provide access to wireless clients by acting as a bridge between the actual access point and the user. Wireless users are often tricked into connecting to an Ad-Hoc station instead of the actual access point, as they may have the same SSID. This allows the Ad-Hoc station to intercept any wireless traffic that connected clients send to or receive from the access point.