Modifications to MDK3 to reboot Access Points
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
docs
osdep First Commit May 23, 2015
useful_files
AUTHORS First Commit May 23, 2015
CHANGELOG First Commit May 23, 2015
COPYING First Commit May 23, 2015
Makefile
README.md Update README.md May 24, 2015
TODO
manufactor.h
mdk3.c
pcap.h

README.md

#Overview

These modifications were not made by me, they were made by a Musket Developer that I have been working with. I have been given permission to share it with the public. This version of MDK3 has a new feature that sends directed probe requests with invalid SSID characters to an AP. The hope is that if enough probes are sent, the AP will lock up and reboot. This tool should only be used for experimenting with the security of your own wireless network.

#Installation

cd /mdk3-master
make
sudo make install

#Usage MDK 3.0 v6(mod-musket-r1) - "fuck the censorship" by ASPj of k2wrlz, using the osdep library from aircrack-ng And with lots of help from the great aircrack-ng community: Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik THANK YOU!

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.
IMPORTANT: It is your responsibility to make sure you have permission from the
network owner before running MDK against it.

This code is licenced under the GPLv2

MDK USAGE:
mdk3 <interface> <test_mode> [test_options]

Try mdk3 --fullhelp for all test options
Try mdk3 --help <test_mode> for info about one test only

TEST MODES:
b   - Beacon Flood Mode
  Sends beacon frames to show fake APs at clients.
  This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
  Sends authentication frames to all APs found in range.
  Too much clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
  Probes AP and check for answer, useful for checking if SSID has
  been correctly decloaked or if AP is in your adaptors sending range
  SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
  Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
  Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
  Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
  This test uses a list of known client MAC Adresses and tries to
  authenticate them to the given AP while dynamically changing
  its response timeout for best performance. It currently works only
  on APs who deny an open authentication request properly
g   - WPA Downgrade test
  deauthenticates Stations and APs sending WPA encrypted packets.
  With this test you can check if the sysadmin will try setting his
  network to WEP or disable encryption.
t   - Probe Request Tests (mod-musket)
  mdk3 <mon> t <channel> <bssid AP> <frames/sec>

#Example Usage mdk3 mon0 t 11 00:11:22:33:44:55 50 mdk3 wlan0mon t 11 00:11:22:33:44:55 50 mon0/wlan0mon is the monitor interface, t is Probe Request Mode, 11 is channel 11, 00:11:22... is the target's MAC Address, and 50 is the packets per second.

#Contributions A big thanks to the Musket Developer who added this new test option to MDK3 :D