In my attempts to learn more about infosec, I have started a small initial project.
- greedy-mac on Github
A linux shell script that continously deauthenticates all MACs on a given AP except for the MAC of a USB wireless dongle (with packet injection capabilities) and also the wireless card of the computer running the script.
This will hopefully allow one machine (the one running the script) to surf the web without sharing bandwidth.
However I am curious as to whether all the deauthenticating of the other machines will affect the AP's ability to serve the machine wanting to surf the web. Let's say 5 MACs are in a loop continuously being deauthenticated while one is allowed to surf the web. Or let's say up to infinity, will there be a point where the interference could be noticed?
Any other issues that could hinder the desired result with this given scenario?