WPA3_SAE_Overflow - C5Lab/projectZero GitHub Wiki
⚡ WPA3 SAE Overflow Protocol ⚡
Why do you need this
WPA3 protocol is resistant to classical deauthentication attacks, but its having its weakness - establishing connection requires heavy cryptographic calculation based on elliptical curves points. This attack sends large number of requests per seconds to the router to prevent any new connections.
How does it work
Flood a single AP with SAE Commit frames using random MAC addresses. Existing connections stay alive, but no new clients can join—the network goes dark.
How to deploy:
scan_networksselect_networks 1(only one, for max impact)sae_overflow
Analyze results in Wireshark: look for “too many stations” error from the AP.