WiFi jamming allows us to take rogue stations/clients off our network. Software does this using de-authentication attack where it will flood the target access-point (AP) with deauth packets. This will cause the target AP to disconnect the clients from the network. It doesn’t involve the actual jamming of radio frequencies, which can be done using […]