SlideShare une entreprise Scribd logo
1  sur  13
Mdk3 Tool in Kali Linux
Presented by:
Muhammad Zohaib Shah Khagga
Introduction
• MDK3 stands for Murder Death Kill 3.
• MDK is a proof-of-concept tool to exploit common
IEEE 802.11 protocol weaknesses.
• It is your responsibility to make sure you have
permission from the network owner before running
MDK against it.
Getting started with mdk3
• As a prerequisite, make sure your wireless adapter is
in packet injecting mode, otherwise this won’t work
right at all.
• To put the wifi adapter into packet injecting mode
use the syntax below to get an idea:
• “airmon-ng start <wireless interface>”
• You can get help by typing “mdk3 –fullhelp”
Mdk3 Purposes..
• SSID Flooding with Mdk3
• Authentication Flooding with mdk3
• De-authentication Flooding with mdk3
SSID Flooding with Mdk3
• One neat trick that MDK3 can do is SSID flooding, or
beacon flooding
• MDK3 can broadcast hundreds or even thousands of
fake access points
• SSID flooding is not denial of service
• You could, in effect, hide your legitimate wireless access
point in a sea of fake access points
1. SSID Flooding with Mdk3 cont…
• Here is the syntax to enable simple SSID flooding (MDK3
will generate random fake access point names)
• “mdk3 <interface> b -c 1”
• Just replace <interface> with the name of your wireless
interface. Remember, usually it’s mon0
• The b option tells MDK3 to use beacon/SSID flooding
mode
• -c1 tells MDK3 to broadcast all the fake access points
on channel 1
2. Authentication Flooding with Mdk3
• The idea behind authentication flooding is simple
• Too many authentication requests at one time may
cause the wireless access point to freeze up and
perhaps stop working entirely
• Authentication flooding doesn’t always work
• A simple command to do authentication flooding is:
“mdk3
<interface> a -a <ap_mac address>”
2. Authentication Flooding with Mdk3 cont…
• All you need is the AP’s(Access Point) MAC address
• a Authentication DoS mode
(Send authentication frames to all APs found in
range)
• -a <ap_mac address>
(You need the access point’s MAC address, which
can be obtained with airodump)
• -m (Use a valid client MAC from OUI database)
2. Authentication Flooding with Mdk3 cont…
• -c (Don’t check that the test was successful, just run
the attack)
• -i <ap_mac> (Performs an intelligent test on the
access point (-a and -c will be ignored). This test
connects clients to the AP and reinjects sniffed data
to keep them alive)
• -s <pps> (Sets the speed in packets per second)
3. De-Authentication Flooding with Mdk3
• The DoS WiFi hacking technique that works best
uses deauthenticate requests rather than faking
authentication requests
• “mdk3 <interface> d -b blacklist_file”
• The only thing you need is the target access point’s
MAC address. Save that MAC address in a text file
and specify it after the -b option
3. De-Authentication Flooding with Mdk3 cont…
• d – Deauthentication / Disassociation Amok Mode Kicks
everybody found from AP
• -w <filename> Read file containing MAC addresses to
ignore (Whitelist mode)
• -b <filename> Read from a file containing MAC
addresses to attack (Blacklist Mode)
• -s <pps> Set the speed in packets per second (Default:
unlimited)
• -c [chan,chan,chan,...] Enables channel hopping.
Without providing any channels, mdk3 will hop all
channels until it finds the target you specified
Refrences
• http://ironkali.blogspot.com/2014/03/tutorial-how-
to-ddos-wifi-with-mdk3.html
• https://tools.kali.org/wireless-attacks/mdk3
• https://svn.mdk3.aircrack-
ng.org/mdk3/docs/Documentation_incomplete.html
Thank You!
No Question please

Contenu connexe

Tendances

Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Vignesh kumar
 
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)Mark Thalib
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
OpenVAS
OpenVASOpenVAS
OpenVASsvm
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)akruthi k
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)정명훈 Jerry Jeong
 

Tendances (20)

WEP
WEPWEP
WEP
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers
 
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)
Bagaimana Belajar Menjadi Seorang Penetration Tester (PenTest)
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
OpenVAS
OpenVASOpenVAS
OpenVAS
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Cisco ios overview
Cisco ios overviewCisco ios overview
Cisco ios overview
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)
SDDC(software defined data center)에서 NFV의 역할과 관리도구 (세미나 발표 자료)
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
 

Similaire à Mdk3 tool in kali linux

Wi fi pentesting
Wi fi pentestingWi fi pentesting
Wi fi pentestingMihir Shah
 
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way HandshakeWireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way Handshakedata68
 
Wi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptxWi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptxMairajuddeen
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackGeekPwn Keen
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networksMaghan Das
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngSecurity Bootcamp
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineeringanchalsinghdm
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngVõ Thái Lâm
 
Network Security VMs Project.pdf
Network Security VMs Project.pdfNetwork Security VMs Project.pdf
Network Security VMs Project.pdfsdfghj21
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Setia Juli Irzal Ismail
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless securitynewbie2019
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 

Similaire à Mdk3 tool in kali linux (20)

Wi fi pentesting
Wi fi pentestingWi fi pentesting
Wi fi pentesting
 
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way HandshakeWireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
 
Wi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptxWi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptx
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Network Security VMs Project.pdf
Network Security VMs Project.pdfNetwork Security VMs Project.pdf
Network Security VMs Project.pdf
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
Wifi cracking
Wifi crackingWifi cracking
Wifi cracking
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Mdk3 tool in kali linux

  • 1. Mdk3 Tool in Kali Linux Presented by: Muhammad Zohaib Shah Khagga
  • 2. Introduction • MDK3 stands for Murder Death Kill 3. • MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. • It is your responsibility to make sure you have permission from the network owner before running MDK against it.
  • 3. Getting started with mdk3 • As a prerequisite, make sure your wireless adapter is in packet injecting mode, otherwise this won’t work right at all. • To put the wifi adapter into packet injecting mode use the syntax below to get an idea: • “airmon-ng start <wireless interface>” • You can get help by typing “mdk3 –fullhelp”
  • 4. Mdk3 Purposes.. • SSID Flooding with Mdk3 • Authentication Flooding with mdk3 • De-authentication Flooding with mdk3
  • 5. SSID Flooding with Mdk3 • One neat trick that MDK3 can do is SSID flooding, or beacon flooding • MDK3 can broadcast hundreds or even thousands of fake access points • SSID flooding is not denial of service • You could, in effect, hide your legitimate wireless access point in a sea of fake access points
  • 6. 1. SSID Flooding with Mdk3 cont… • Here is the syntax to enable simple SSID flooding (MDK3 will generate random fake access point names) • “mdk3 <interface> b -c 1” • Just replace <interface> with the name of your wireless interface. Remember, usually it’s mon0 • The b option tells MDK3 to use beacon/SSID flooding mode • -c1 tells MDK3 to broadcast all the fake access points on channel 1
  • 7. 2. Authentication Flooding with Mdk3 • The idea behind authentication flooding is simple • Too many authentication requests at one time may cause the wireless access point to freeze up and perhaps stop working entirely • Authentication flooding doesn’t always work • A simple command to do authentication flooding is: “mdk3 <interface> a -a <ap_mac address>”
  • 8. 2. Authentication Flooding with Mdk3 cont… • All you need is the AP’s(Access Point) MAC address • a Authentication DoS mode (Send authentication frames to all APs found in range) • -a <ap_mac address> (You need the access point’s MAC address, which can be obtained with airodump) • -m (Use a valid client MAC from OUI database)
  • 9. 2. Authentication Flooding with Mdk3 cont… • -c (Don’t check that the test was successful, just run the attack) • -i <ap_mac> (Performs an intelligent test on the access point (-a and -c will be ignored). This test connects clients to the AP and reinjects sniffed data to keep them alive) • -s <pps> (Sets the speed in packets per second)
  • 10. 3. De-Authentication Flooding with Mdk3 • The DoS WiFi hacking technique that works best uses deauthenticate requests rather than faking authentication requests • “mdk3 <interface> d -b blacklist_file” • The only thing you need is the target access point’s MAC address. Save that MAC address in a text file and specify it after the -b option
  • 11. 3. De-Authentication Flooding with Mdk3 cont… • d – Deauthentication / Disassociation Amok Mode Kicks everybody found from AP • -w <filename> Read file containing MAC addresses to ignore (Whitelist mode) • -b <filename> Read from a file containing MAC addresses to attack (Blacklist Mode) • -s <pps> Set the speed in packets per second (Default: unlimited) • -c [chan,chan,chan,...] Enables channel hopping. Without providing any channels, mdk3 will hop all channels until it finds the target you specified