-
Notifications
You must be signed in to change notification settings - Fork 12
WPA3 SAE Overflow
Dominik edited this page Mar 22, 2026
·
2 revisions
WPA3 protocol is resistant to classical deauthentication attacks, but its having its weakness - establishing connection requires heavy cryptographic calculation based on elliptical curves points. This attack sends large number of requests per seconds to the router to prevent any new connections.
Flood a single AP with SAE Commit frames using random MAC addresses. Existing connections stay alive, but no new clients can join—the network goes dark.
- Prepare exactly one WPA3 target:
scan_networks
select_networks 1- Start overflow attack:
sae_overflow- Monitor effect:
Observe that new client associations fail while the attack is active.
- Stop attack:
stop- Optional validation:
Capture with Wireshark and inspect SAE commit flood behavior.