From 2aa18ab7e8c6fe4665194fc3938b9e83d6df123e Mon Sep 17 00:00:00 2001 From: vanhoefm Date: Fri, 30 Jun 2017 15:16:56 +0200 Subject: [PATCH] README.md: TP-Link WN722N v2 does not use Atheros --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index fe65aaa..052021c 100644 --- a/README.md +++ b/README.md @@ -2,9 +2,9 @@ We provide tools to perform low-layer attacks such as reactive and constant jamming using commodity devices. Reactive jamming allows you to block specific Wi-Fi packets. For example, all beacons and probe responses of a specific Access Point (AP) can be jammed. It has been tested with the following devices: -* [TP-Link WN722N](http://www.amazon.com/dp/B002WBX9C6?tag=modwiffir-20) * [AWUS036NHA](http://www.amazon.com/dp/B004Y6MIXS?tag=modwiffir-20) * [WNDA3200](http://www.amazon.co.uk/dp/B009XSPZ0U?tag=modwiffir-20) +* [TP-Link WN722N v1](https://wikidevi.com/wiki/TP-LINK_TL-WN722N) (The newer v2 version is not compatible with ModWifi because it no longer uses an Atheros chip. Be sure to buy the v1 version.) This work was the result of the paper [Advanced Wi-Fi Attacks Using Commodity Hardware](https://lirias.kuleuven.be/bitstream/123456789/473761/1/acsac2014.pdf) presented at ACSAC 2014. *If you use these tools in your research, please reference this paper.* Most code is open source, and contributions are welcome. The code of the constant jammer can be requested but is not available publicly. Don't worry, we won't bite.