From 69882c7fc178ae61175e3ee9083c9b0f6b912d98 Mon Sep 17 00:00:00 2001 From: Ben Abrahamson Date: Wed, 9 Aug 2017 19:58:53 +0100 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3c188c5..db92687 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ Other attacks also have been implemented, such as beacon and probe request flood The deauth attack works by exploiting an old and known vulnerability in the 802.11 Wi-Fi protocol. Because these [deauthentication frames](https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/), usually used to close a Wi-Fi connection safely, are unencrypted, it's very easy to spoof them. You only need the mac address of the access point, which you can sniff easily. -If you don't want to attack all connected devices, you can also scan for connections and attack them specifictly. +If you don't want to attack all connected devices, you can also scan for connections and attack them specifically. ### How to protect yourself against it @@ -71,7 +71,7 @@ My intention with this project is to draw more attention on this issue. This attack shows how vulnerable the 802.11 Wi-Fi standard is and that it has to be fixed. **A solution is already there, why don't we use it?** -Please don't refer to this project as "jammer", that totaly underminds the real purpose of this project! +Please don't refer to this project as "jammer", that totally undermines the real purpose of this project! ## Supported Devices