mdk4 Description
MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.
MDK4 is a new version of MDK3.
MDK4 is a Wi-Fi testing tool from E7mer of 360PegasusTeam, ASPj of k2wrlz, it uses the osdep library from the aircrack-ng project to inject frames on several operating systems.
Features
Supports two WiFi card (one for receiving data, another for injecting data).
Supports block the specified ESSID/BSSID/Station MAC in command option.
Supports both 2.4 to 5GHz (Linux).
Supports IDS Evasion (Ghosting, Fragmenting, Does not fully work with every driver).
Supports packet fuzz testing.
Homepage:
https://github.com/aircrack-ng/mdk4
Author: E7mer
License: GPLv3
mdk4 Help
MDK USAGE:
1
2
mdk4 <interface> <attack_mode> [attack_options]
mdk4 <interface in> <interface out> <attack_mode> [attack_options]
There are 9 attack modules, they are denoted by a single letter.
ATTACK MODE b: Beacon Flooding
Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even drivers!
ATTACK MODE a: Authentication Denial-Of-Service
Sends authentication frames to all APs found in range. Too many clients can freeze or reset several APs.
ATTACK MODE p: SSID Probing and Bruteforcing
Probes APs and checks for answer, useful for checking if SSID has been correctly decloaked and if AP is in your sending range. Bruteforcing of hidden SSIDs with or without a wordlist is also available.
ATTACK MODE d: Deauthentication and Disassociation
Sends deauthentication and disassociation packets to stations based on data traffic to disconnect all clients from an AP.
ATTACK MODE m: Michael Countermeasures Exploitation
Sends random packets or re-injects duplicates on another QoS queue to provoke Michael Countermeasures on TKIP APs. AP will then shutdown for a whole minute, making this an effective DoS.
ATTACK MODE e: EAPOL Start and Logoff Packet Injection
Floods an AP with EAPOL Start frames to keep it busy with fake sessions and thus disables it to handle any legitimate clients. Or logs off clients by injecting fake EAPOL Logoff messages.
ATTACK MODE s: Attacks for IEEE 802.11s mesh networks
Various attacks on link management and routing in mesh networks. Flood neighbors and routes, create black holes and divert traffic!
ATTACK MODE w: WIDS Confusion
Confuse/Abuse Intrusion Detection and Prevention Systems by cross-connecting clients to multiple WDS nodes or fake rogue APs.
ATTACK MODE f: Packet Fuzzer
A simple packet fuzzer with multiple packet sources and a nice set of modifiers. Be careful!
mdk4 Usage Example
The ‘Beacon Flooding’ attack (b) (creates the appearance of the presence of many fake access points) on the wireless interface (wlo1), while also using non-printable characters in the generated SSID and creating SSIDs that break the 32-byte limit (-a) with valid MAC access points from the embedded OUI database (-m) and send packets at a speed of 500 packets per second (-s 500):
1
sudo mdk4 wlo1 b -a -m -s 500
How to install mdk4
Installation on Kali Linux
1
sudo apt install mdk4
Installation on BlackArch
1
2
3
4
5
sudo pacman -S pkg-config libnl libpcap
git clone
https://github.com/aircrack-ng/mdk4
cd mdk4/
make
sudo make install
Installation on Linux (Debian, Mint, Ubuntu)
1
2
3
4
5
sudo apt install pkg-config libnl-3-dev libnl-genl-3-dev libpcap-dev
git clone
https://github.com/aircrack-ng/mdk4
cd mdk4/
make
sudo make install
mdk4 Screenshots
The result of the b attack:
mdk4 Tutorials
For more information about how attacks work, see the mdk3 help.
USB Wi-Fi Adapters with monitor mode and wireless injection (100% compatible with Kali Linux) 2021
Related tools
mdk3 (88.8%)
wifijammer (73.3%)
LANs.py (62.1%)
Aircrack-ng (Tool) (57.1%)
Router Scan (57.1%)
NMBscan (RANDOM - 1.9%)