Virus transmission or school Wi-Fi dangerous?

Ke
4

I have no plans, but can the teachers find out who did this? Because of the laptop's IP, etc?

So if you use a deauther / jammer.

He

When you log on to a network, address information is automatically transferred from your computer to the network and can be read out on a blog. The Mac address is also sent every time you log in, which can be clearly assigned to your device. If the school is really hard, you could search for the Mac address and find out what devices that were

gr

A deauther uses a fake MAC address. Therefore, it is usually not possible to identify the laptop used.

However, it is illegal. So better leave it.

Au

Viruses and Trojans can be identified by their IP and Mac address and various other things that could be found in the programs.

In the case of deauth attacks, you send fake packets with fake Mac addresses and you do not have to be logged in to the WLAN. If you do it right then not but I say who has to ask such questions will not get it…

If I think about the topic OpSec this question alone is a failure!

Ke

Deauthentication and jamming take place at level 1 and level 2. This has nothing to do with IP addresses, IP addresses are not visible in such attacks. You don't even have to be logged on to the network for such attacks. In other words, such attacks are difficult to trace unless you are caught red-handed.