Skip to content

WPA3 SAE Overflow

Dominik edited this page Mar 22, 2026 · 2 revisions
cyberpunk-banner

WPA3 SAE Overflow Protocol

Why do you need this

WPA3 protocol is resistant to classical deauthentication attacks, but its having its weakness - establishing connection requires heavy cryptographic calculation based on elliptical curves points. This attack sends large number of requests per seconds to the router to prevent any new connections.

How does it work

Flood a single AP with SAE Commit frames using random MAC addresses. Existing connections stay alive, but no new clients can join—the network goes dark.


Commands Workflow

  1. Prepare exactly one WPA3 target:
scan_networks
select_networks 1
  1. Start overflow attack:
sae_overflow
  1. Monitor effect:
Observe that new client associations fail while the attack is active.
  1. Stop attack:
stop
  1. Optional validation:
Capture with Wireshark and inspect SAE commit flood behavior.

Clone this wiki locally