diff --git a/README.md b/README.md index fe65aaa..052021c 100644 --- a/README.md +++ b/README.md @@ -2,9 +2,9 @@ We provide tools to perform low-layer attacks such as reactive and constant jamming using commodity devices. Reactive jamming allows you to block specific Wi-Fi packets. For example, all beacons and probe responses of a specific Access Point (AP) can be jammed. It has been tested with the following devices: -* [TP-Link WN722N](http://www.amazon.com/dp/B002WBX9C6?tag=modwiffir-20) * [AWUS036NHA](http://www.amazon.com/dp/B004Y6MIXS?tag=modwiffir-20) * [WNDA3200](http://www.amazon.co.uk/dp/B009XSPZ0U?tag=modwiffir-20) +* [TP-Link WN722N v1](https://wikidevi.com/wiki/TP-LINK_TL-WN722N) (The newer v2 version is not compatible with ModWifi because it no longer uses an Atheros chip. Be sure to buy the v1 version.) This work was the result of the paper [Advanced Wi-Fi Attacks Using Commodity Hardware](https://lirias.kuleuven.be/bitstream/123456789/473761/1/acsac2014.pdf) presented at ACSAC 2014. *If you use these tools in your research, please reference this paper.* Most code is open source, and contributions are welcome. The code of the constant jammer can be requested but is not available publicly. Don't worry, we won't bite.