0 امتیاز
151 بازدید
در لینوکس توسط مدیر کل (15.6k امتیاز)
mdk4 Description

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.

MDK4 is a new version of MDK3.

MDK4 is a Wi-Fi testing tool from E7mer of 360PegasusTeam, ASPj of k2wrlz, it uses the osdep library from the aircrack-ng project to inject frames on several operating systems.

Features

Supports two WiFi card (one for receiving data, another for injecting data).

Supports block the specified ESSID/BSSID/Station MAC in command option.

Supports both 2.4 to 5GHz (Linux).

Supports IDS Evasion (Ghosting, Fragmenting, Does not fully work with every driver).

Supports packet fuzz testing.

Homepage: https://github.com/aircrack-ng/mdk4

Author: E7mer

License: GPLv3

mdk4 Help

MDK USAGE:

1

2

mdk4 <interface> <attack_mode> [attack_options]

mdk4 <interface in> <interface out> <attack_mode> [attack_options]

There are 9 attack modules, they are denoted by a single letter.

ATTACK MODE b: Beacon Flooding

Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even drivers!

ATTACK MODE a: Authentication Denial-Of-Service

Sends authentication frames to all APs found in range. Too many clients can freeze or reset several APs.

ATTACK MODE p: SSID Probing and Bruteforcing

Probes APs and checks for answer, useful for checking if SSID has been correctly decloaked and if AP is in your sending range. Bruteforcing of hidden SSIDs with or without a wordlist is also available.

ATTACK MODE d: Deauthentication and Disassociation

Sends deauthentication and disassociation packets to stations based on data traffic to disconnect all clients from an AP.

ATTACK MODE m: Michael Countermeasures Exploitation

Sends random packets or re-injects duplicates on another QoS queue to provoke Michael Countermeasures on TKIP APs. AP will then shutdown for a whole minute, making this an effective DoS.

ATTACK MODE e: EAPOL Start and Logoff Packet Injection

Floods an AP with EAPOL Start frames to keep it busy with fake sessions and thus disables it to handle any legitimate clients. Or logs off clients by injecting fake EAPOL Logoff messages.

ATTACK MODE s: Attacks for IEEE 802.11s mesh networks

Various attacks on link management and routing in mesh networks. Flood neighbors and routes, create black holes and divert traffic!

ATTACK MODE w: WIDS Confusion

Confuse/Abuse Intrusion Detection and Prevention Systems by cross-connecting clients to multiple WDS nodes or fake rogue APs.

ATTACK MODE f: Packet Fuzzer

A simple packet fuzzer with multiple packet sources and a nice set of modifiers. Be careful!

mdk4 Usage Example

The ‘Beacon Flooding’ attack (b) (creates the appearance of the presence of many fake access points) on the wireless interface (wlo1), while also using non-printable characters in the generated SSID and creating SSIDs that break the 32-byte limit (-a) with valid MAC access points from the embedded OUI database (-m) and send packets at a speed of 500 packets per second (-s 500):

1

sudo mdk4 wlo1 b -a -m -s 500

How to install mdk4

Installation on Kali Linux

1

sudo apt install mdk4

Installation on BlackArch

1

2

3

4

5

sudo pacman -S pkg-config libnl libpcap

git clone https://github.com/aircrack-ng/mdk4

cd mdk4/

make

sudo make install

Installation on Linux (Debian, Mint, Ubuntu)

1

2

3

4

5

sudo apt install pkg-config libnl-3-dev libnl-genl-3-dev libpcap-dev

git clone https://github.com/aircrack-ng/mdk4

cd mdk4/

make

sudo make install

mdk4 Screenshots

The result of the b attack:

mdk4 Tutorials

For more information about how attacks work, see the mdk3 help.

USB Wi-Fi Adapters with monitor mode and wireless injection (100% compatible with Kali Linux) 2021

Related tools

mdk3 (88.8%)

wifijammer (73.3%)

LANs.py (62.1%)

Aircrack-ng (Tool) (57.1%)

Router Scan (57.1%)

NMBscan (RANDOM - 1.9%)

پاسخ شما

حریم شخصی : آدرس ایمیل شما محفوظ میماند و برای استفاده های تجاری و تبلیغاتی به کار نمی رود
FOXNET محلی برای دانستن واشتراک مطالبی که نمی دانستید

سوالات مشابه

0 امتیاز
0 پاسخ 102 بازدید
سوال شده مارس 2, 2022 در لینوکس توسط admin مدیر کل (15.6k امتیاز)
0 امتیاز
0 پاسخ 235 بازدید
سوال شده فوریه 15, 2022 در لینوکس توسط admin مدیر کل (15.6k امتیاز)
0 امتیاز
0 پاسخ 316 بازدید
سوال شده مارس 1, 2020 در لینوکس توسط admin مدیر کل (15.6k امتیاز)
0 امتیاز
0 پاسخ 584 بازدید
سوال شده نوامبر 22, 2018 در لینوکس توسط admin مدیر کل (15.6k امتیاز)
0 امتیاز
1 پاسخ 561 بازدید
سوال شده دسامبر 11, 2017 در لینوکس توسط admin مدیر کل (15.6k امتیاز)
...