SlideShare a Scribd company logo
Mdk3 Tool in Kali Linux
Presented by:
Muhammad Zohaib Shah Khagga
Introduction
• MDK3 stands for Murder Death Kill 3.
• MDK is a proof-of-concept tool to exploit common
IEEE 802.11 protocol weaknesses.
• It is your responsibility to make sure you have
permission from the network owner before running
MDK against it.
Getting started with mdk3
• As a prerequisite, make sure your wireless adapter is
in packet injecting mode, otherwise this won’t work
right at all.
• To put the wifi adapter into packet injecting mode
use the syntax below to get an idea:
• “airmon-ng start <wireless interface>”
• You can get help by typing “mdk3 –fullhelp”
Mdk3 Purposes..
• SSID Flooding with Mdk3
• Authentication Flooding with mdk3
• De-authentication Flooding with mdk3
SSID Flooding with Mdk3
• One neat trick that MDK3 can do is SSID flooding, or
beacon flooding
• MDK3 can broadcast hundreds or even thousands of
fake access points
• SSID flooding is not denial of service
• You could, in effect, hide your legitimate wireless access
point in a sea of fake access points
1. SSID Flooding with Mdk3 cont…
• Here is the syntax to enable simple SSID flooding (MDK3
will generate random fake access point names)
• “mdk3 <interface> b -c 1”
• Just replace <interface> with the name of your wireless
interface. Remember, usually it’s mon0
• The b option tells MDK3 to use beacon/SSID flooding
mode
• -c1 tells MDK3 to broadcast all the fake access points
on channel 1
2. Authentication Flooding with Mdk3
• The idea behind authentication flooding is simple
• Too many authentication requests at one time may
cause the wireless access point to freeze up and
perhaps stop working entirely
• Authentication flooding doesn’t always work
• A simple command to do authentication flooding is:
“mdk3
<interface> a -a <ap_mac address>”
2. Authentication Flooding with Mdk3 cont…
• All you need is the AP’s(Access Point) MAC address
• a Authentication DoS mode
(Send authentication frames to all APs found in
range)
• -a <ap_mac address>
(You need the access point’s MAC address, which
can be obtained with airodump)
• -m (Use a valid client MAC from OUI database)
2. Authentication Flooding with Mdk3 cont…
• -c (Don’t check that the test was successful, just run
the attack)
• -i <ap_mac> (Performs an intelligent test on the
access point (-a and -c will be ignored). This test
connects clients to the AP and reinjects sniffed data
to keep them alive)
• -s <pps> (Sets the speed in packets per second)
3. De-Authentication Flooding with Mdk3
• The DoS WiFi hacking technique that works best
uses deauthenticate requests rather than faking
authentication requests
• “mdk3 <interface> d -b blacklist_file”
• The only thing you need is the target access point’s
MAC address. Save that MAC address in a text file
and specify it after the -b option
3. De-Authentication Flooding with Mdk3 cont…
• d – Deauthentication / Disassociation Amok Mode Kicks
everybody found from AP
• -w <filename> Read file containing MAC addresses to
ignore (Whitelist mode)
• -b <filename> Read from a file containing MAC
addresses to attack (Blacklist Mode)
• -s <pps> Set the speed in packets per second (Default:
unlimited)
• -c [chan,chan,chan,...] Enables channel hopping.
Without providing any channels, mdk3 will hop all
channels until it finds the target you specified
Refrences
• http://ironkali.blogspot.com/2014/03/tutorial-how-
to-ddos-wifi-with-mdk3.html
• https://tools.kali.org/wireless-attacks/mdk3
• https://svn.mdk3.aircrack-
ng.org/mdk3/docs/Documentation_incomplete.html
Thank You!
No Question please

More Related Content

What's hot

Email security
Email securityEmail security
Email security
Baliram Yadav
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
m srikanth
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
[Android] Web services
[Android] Web services[Android] Web services
[Android] Web services
Nikmesoft Ltd
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
Amazon Web Services
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
Nurkholish Halim
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
Dan Brinkmann
 
Browser Security
Browser SecurityBrowser Security
Browser Security
Roberto Suggi Liverani
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
Michael Hendrickx
 
Wap
WapWap
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
DEF CON 27 - BEN SADEGHIPOUR  - owning the clout through ssrf and pdf generatorsDEF CON 27 - BEN SADEGHIPOUR  - owning the clout through ssrf and pdf generators
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
Felipe Prado
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Injection flaws
Injection flawsInjection flaws
Injection flaws
DANISH INAMDAR
 
Introduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android ApplicationIntroduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android Application
Kelwin Yang
 
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes - End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes -
Thomas Seropian
 
Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
Marcelo Sávio
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
Milan Petrásek
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Dirk Nicol
 
Email security
Email securityEmail security
Email security
Ahmed EL-KOSAIRY
 

What's hot (20)

Email security
Email securityEmail security
Email security
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Network security
Network security Network security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
[Android] Web services
[Android] Web services[Android] Web services
[Android] Web services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
Wap
WapWap
Wap
 
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
DEF CON 27 - BEN SADEGHIPOUR  - owning the clout through ssrf and pdf generatorsDEF CON 27 - BEN SADEGHIPOUR  - owning the clout through ssrf and pdf generators
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
 
Web Security
Web SecurityWeb Security
Web Security
 
Injection flaws
Injection flawsInjection flaws
Injection flaws
 
Introduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android ApplicationIntroduction to Dynamic Analysis of Android Application
Introduction to Dynamic Analysis of Android Application
 
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes - End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes -
 
Cloud Computing - Technologies and Trends
Cloud Computing - Technologies and TrendsCloud Computing - Technologies and Trends
Cloud Computing - Technologies and Trends
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Email security
Email securityEmail security
Email security
 

Similar to Mdk3 tool in kali linux

Wi fi pentesting
Wi fi pentestingWi fi pentesting
Wi fi pentesting
Mihir Shah
 
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way HandshakeWireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
data68
 
Wi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptxWi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptx
Mairajuddeen
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
GeekPwn Keen
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
Maghan Das
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
Pranshu Pareek
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
anchalsinghdm
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
Network Security VMs Project.pdf
Network Security VMs Project.pdfNetwork Security VMs Project.pdf
Network Security VMs Project.pdf
sdfghj21
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
Prathan Phongthiproek
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
Setia Juli Irzal Ismail
 
Wifi cracking
Wifi crackingWifi cracking
Wifi cracking
AbhashKumarJha
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
newbie2019
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
Chong-Kuan Chen
 

Similar to Mdk3 tool in kali linux (20)

Wi fi pentesting
Wi fi pentestingWi fi pentesting
Wi fi pentesting
 
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way HandshakeWireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
 
Wi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptxWi-Fi Security Presentation.pptx
Wi-Fi Security Presentation.pptx
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Network Security VMs Project.pdf
Network Security VMs Project.pdfNetwork Security VMs Project.pdf
Network Security VMs Project.pdf
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
Wifi cracking
Wifi crackingWifi cracking
Wifi cracking
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 

Recently uploaded

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
Larry Smarr
 
Kubernetes Cloud Native Indonesia Meetup - June 2024
Kubernetes Cloud Native Indonesia Meetup - June 2024Kubernetes Cloud Native Indonesia Meetup - June 2024
Kubernetes Cloud Native Indonesia Meetup - June 2024
Prasta Maha
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
Alpen-Adria-Universität
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
Raphaël Semeteys
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Earley Information Science
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
STKI Israeli Market Study 2024 final v1
STKI Israeli Market Study 2024 final  v1STKI Israeli Market Study 2024 final  v1
STKI Israeli Market Study 2024 final v1
Dr. Jimmy Schwarzkopf
 
9 Ways Pastors Will Use AI Everyday By 2029
9 Ways Pastors Will Use AI Everyday By 20299 Ways Pastors Will Use AI Everyday By 2029
9 Ways Pastors Will Use AI Everyday By 2029
Big Click Syndicate LLC
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
Neeraj Kumar Singh
 
Chapter 4 - Test Analysis & Design Techniques V4.0
Chapter 4 - Test Analysis & Design Techniques V4.0Chapter 4 - Test Analysis & Design Techniques V4.0
Chapter 4 - Test Analysis & Design Techniques V4.0
Neeraj Kumar Singh
 
ASIMOV: Enterprise RAG at Dialog Axiata PLC
ASIMOV: Enterprise RAG at Dialog Axiata PLCASIMOV: Enterprise RAG at Dialog Axiata PLC
ASIMOV: Enterprise RAG at Dialog Axiata PLC
Zilliz
 
Chapter 2 - Testing Throughout SDLC V4.0
Chapter 2 - Testing Throughout SDLC V4.0Chapter 2 - Testing Throughout SDLC V4.0
Chapter 2 - Testing Throughout SDLC V4.0
Neeraj Kumar Singh
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
John Sterrett
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Multimodal Retrieval Augmented Generation (RAG) with Milvus
Multimodal Retrieval Augmented Generation (RAG) with MilvusMultimodal Retrieval Augmented Generation (RAG) with Milvus
Multimodal Retrieval Augmented Generation (RAG) with Milvus
Zilliz
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 

Recently uploaded (20)

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
 
Kubernetes Cloud Native Indonesia Meetup - June 2024
Kubernetes Cloud Native Indonesia Meetup - June 2024Kubernetes Cloud Native Indonesia Meetup - June 2024
Kubernetes Cloud Native Indonesia Meetup - June 2024
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
STKI Israeli Market Study 2024 final v1
STKI Israeli Market Study 2024 final  v1STKI Israeli Market Study 2024 final  v1
STKI Israeli Market Study 2024 final v1
 
9 Ways Pastors Will Use AI Everyday By 2029
9 Ways Pastors Will Use AI Everyday By 20299 Ways Pastors Will Use AI Everyday By 2029
9 Ways Pastors Will Use AI Everyday By 2029
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
 
Chapter 4 - Test Analysis & Design Techniques V4.0
Chapter 4 - Test Analysis & Design Techniques V4.0Chapter 4 - Test Analysis & Design Techniques V4.0
Chapter 4 - Test Analysis & Design Techniques V4.0
 
ASIMOV: Enterprise RAG at Dialog Axiata PLC
ASIMOV: Enterprise RAG at Dialog Axiata PLCASIMOV: Enterprise RAG at Dialog Axiata PLC
ASIMOV: Enterprise RAG at Dialog Axiata PLC
 
Chapter 2 - Testing Throughout SDLC V4.0
Chapter 2 - Testing Throughout SDLC V4.0Chapter 2 - Testing Throughout SDLC V4.0
Chapter 2 - Testing Throughout SDLC V4.0
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Multimodal Retrieval Augmented Generation (RAG) with Milvus
Multimodal Retrieval Augmented Generation (RAG) with MilvusMultimodal Retrieval Augmented Generation (RAG) with Milvus
Multimodal Retrieval Augmented Generation (RAG) with Milvus
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 

Mdk3 tool in kali linux

  • 1. Mdk3 Tool in Kali Linux Presented by: Muhammad Zohaib Shah Khagga
  • 2. Introduction • MDK3 stands for Murder Death Kill 3. • MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. • It is your responsibility to make sure you have permission from the network owner before running MDK against it.
  • 3. Getting started with mdk3 • As a prerequisite, make sure your wireless adapter is in packet injecting mode, otherwise this won’t work right at all. • To put the wifi adapter into packet injecting mode use the syntax below to get an idea: • “airmon-ng start <wireless interface>” • You can get help by typing “mdk3 –fullhelp”
  • 4. Mdk3 Purposes.. • SSID Flooding with Mdk3 • Authentication Flooding with mdk3 • De-authentication Flooding with mdk3
  • 5. SSID Flooding with Mdk3 • One neat trick that MDK3 can do is SSID flooding, or beacon flooding • MDK3 can broadcast hundreds or even thousands of fake access points • SSID flooding is not denial of service • You could, in effect, hide your legitimate wireless access point in a sea of fake access points
  • 6. 1. SSID Flooding with Mdk3 cont… • Here is the syntax to enable simple SSID flooding (MDK3 will generate random fake access point names) • “mdk3 <interface> b -c 1” • Just replace <interface> with the name of your wireless interface. Remember, usually it’s mon0 • The b option tells MDK3 to use beacon/SSID flooding mode • -c1 tells MDK3 to broadcast all the fake access points on channel 1
  • 7. 2. Authentication Flooding with Mdk3 • The idea behind authentication flooding is simple • Too many authentication requests at one time may cause the wireless access point to freeze up and perhaps stop working entirely • Authentication flooding doesn’t always work • A simple command to do authentication flooding is: “mdk3 <interface> a -a <ap_mac address>”
  • 8. 2. Authentication Flooding with Mdk3 cont… • All you need is the AP’s(Access Point) MAC address • a Authentication DoS mode (Send authentication frames to all APs found in range) • -a <ap_mac address> (You need the access point’s MAC address, which can be obtained with airodump) • -m (Use a valid client MAC from OUI database)
  • 9. 2. Authentication Flooding with Mdk3 cont… • -c (Don’t check that the test was successful, just run the attack) • -i <ap_mac> (Performs an intelligent test on the access point (-a and -c will be ignored). This test connects clients to the AP and reinjects sniffed data to keep them alive) • -s <pps> (Sets the speed in packets per second)
  • 10. 3. De-Authentication Flooding with Mdk3 • The DoS WiFi hacking technique that works best uses deauthenticate requests rather than faking authentication requests • “mdk3 <interface> d -b blacklist_file” • The only thing you need is the target access point’s MAC address. Save that MAC address in a text file and specify it after the -b option
  • 11. 3. De-Authentication Flooding with Mdk3 cont… • d – Deauthentication / Disassociation Amok Mode Kicks everybody found from AP • -w <filename> Read file containing MAC addresses to ignore (Whitelist mode) • -b <filename> Read from a file containing MAC addresses to attack (Blacklist Mode) • -s <pps> Set the speed in packets per second (Default: unlimited) • -c [chan,chan,chan,...] Enables channel hopping. Without providing any channels, mdk3 will hop all channels until it finds the target you specified