<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://hack-it.org/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
		<id>http://hack-it.org/index.php?action=history&amp;feed=atom&amp;title=Mdk3</id>
		<title>Mdk3 - Historique des versions</title>
		<link rel="self" type="application/atom+xml" href="http://hack-it.org/index.php?action=history&amp;feed=atom&amp;title=Mdk3"/>
		<link rel="alternate" type="text/html" href="http://hack-it.org/index.php?title=Mdk3&amp;action=history"/>
		<updated>2026-04-13T11:56:13Z</updated>
		<subtitle>Historique pour cette page sur le wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://hack-it.org/index.php?title=Mdk3&amp;diff=14460&amp;oldid=prev</id>
		<title>Fnord&amp;nbsp;:&amp;#32;auteur: matoufoutu</title>
		<link rel="alternate" type="text/html" href="http://hack-it.org/index.php?title=Mdk3&amp;diff=14460&amp;oldid=prev"/>
				<updated>2010-01-17T05:14:07Z</updated>
		
		<summary type="html">&lt;p&gt;auteur: matoufoutu&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Un outil très puissant, comporte plusieurs options permettant de planter un routeur wifi, de flooder un chan entier, et bien plus encore...&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://homepages.tu-darmstadt.de/~p_larbig/wlan/mdk3-v5.tar.bz2 MDK-3 v5]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pour pouvoir le compiler sous ubuntu (à vérifier pour les autres distributions) il faut installer gcc-2.4 et modifier le fichier mdk3/osdep/common.mak&amp;lt;br /&amp;gt;&lt;br /&gt;
Remplacer la ligne:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
CC = $(TOOL_PREFIX)gcc&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
par:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
CC = $(TOOL_PREFIX)gcc-4.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Un petit script très utile pour l'utiliser (créé par MatToufoutu):&amp;lt;br /&amp;gt; [http://www.zonard.net/~mattoufoutu/AP-Fucker.py AP-Fucker.py]&amp;lt;br /&amp;gt;&lt;br /&gt;
Il permet un &amp;quot;mode destruction&amp;quot; qui lance 4 attaques différentes simultanément.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
MDK 3.0 v5 - &amp;quot;OOPS! My expensive Microsoft® Windows® VISTA® crashed :(&amp;quot;-Edition&lt;br /&gt;
by ASPj of k2wrlz, using the osdep library from aircrack-ng&lt;br /&gt;
And with lots of help from the great aircrack-ng community:&lt;br /&gt;
Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape,&lt;br /&gt;
telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik&lt;br /&gt;
THANK YOU!&lt;br /&gt;
&lt;br /&gt;
MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.&lt;br /&gt;
IMPORTANT: It is your responsibility to make sure you have permission from the&lt;br /&gt;
network owner before running MDK against it.&lt;br /&gt;
&lt;br /&gt;
This code is licenced under the GPLv2&lt;br /&gt;
&lt;br /&gt;
MDK USAGE:&lt;br /&gt;
mdk3 &amp;lt;interface&amp;gt; &amp;lt;test_mode&amp;gt; [test_options]&lt;br /&gt;
&lt;br /&gt;
Try mdk3 --fullhelp for all test options&lt;br /&gt;
Try mdk3 --help &amp;lt;test_mode&amp;gt; for info about one test only&lt;br /&gt;
&lt;br /&gt;
TEST MODES:&lt;br /&gt;
b   - Beacon Flood Mode&lt;br /&gt;
      Sends beacon frames to show fake APs at clients.&lt;br /&gt;
      This can sometimes crash network scanners and even drivers!&lt;br /&gt;
a   - Authentication DoS mode&lt;br /&gt;
      Sends authentication frames to all APs found in range.&lt;br /&gt;
      Too much clients freeze or reset some APs.&lt;br /&gt;
p   - Basic probing and ESSID Bruteforce mode&lt;br /&gt;
      Probes AP and check for answer, useful for checking if SSID has&lt;br /&gt;
      been correctly decloaked or if AP is in your adaptors sending range&lt;br /&gt;
      SSID Bruteforcing is also possible with this test mode.&lt;br /&gt;
d   - Deauthentication / Disassociation Amok Mode&lt;br /&gt;
      Kicks everybody found from AP&lt;br /&gt;
m   - Michael shutdown exploitation (TKIP)&lt;br /&gt;
      Cancels all traffic continuously&lt;br /&gt;
x   - 802.1X tests&lt;br /&gt;
w   - WIDS/WIPS Confusion&lt;br /&gt;
      Confuse/Abuse Intrusion Detection and Prevention Systems&lt;br /&gt;
f   - MAC filter bruteforce mode&lt;br /&gt;
      This test uses a list of known client MAC Adresses and tries to&lt;br /&gt;
      authenticate them to the given AP while dynamically changing&lt;br /&gt;
      its response timeout for best performance. It currently works only&lt;br /&gt;
      on APs who deny an open authentication request properly&lt;br /&gt;
g   - WPA Downgrade test&lt;br /&gt;
      deauthenticates Stations and APs sending WPA encrypted packets.&lt;br /&gt;
      With this test you can check if the sysadmin will try setting his&lt;br /&gt;
      network to WEP or disable encryption.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
b   - Beacon Flood Mode                                                  &lt;br /&gt;
      Sends beacon frames to show fake APs at clients.                   &lt;br /&gt;
      This can sometimes crash network scanners and even drivers!        &lt;br /&gt;
      OPTIONS:                                                           &lt;br /&gt;
      -n &amp;lt;ssid&amp;gt;                                                          &lt;br /&gt;
         Use SSID &amp;lt;ssid&amp;gt; instead of randomly generated ones              &lt;br /&gt;
      -f &amp;lt;filename&amp;gt;                                                      &lt;br /&gt;
         Read SSIDs from file                                            &lt;br /&gt;
      -v &amp;lt;filename&amp;gt;                                                      &lt;br /&gt;
         Read MACs and SSIDs from file. See example file!                &lt;br /&gt;
      -d                                                                 &lt;br /&gt;
         Show station as Ad-Hoc&lt;br /&gt;
      -w&lt;br /&gt;
         Set WEP bit (Generates encrypted networks)&lt;br /&gt;
      -g&lt;br /&gt;
         Show station as 54 Mbit&lt;br /&gt;
      -t&lt;br /&gt;
         Show station using WPA TKIP encryption&lt;br /&gt;
      -a&lt;br /&gt;
         Show station using WPA AES encryption&lt;br /&gt;
      -m&lt;br /&gt;
         Use valid accesspoint MAC from OUI database&lt;br /&gt;
      -h&lt;br /&gt;
         Hop to channel where AP is spoofed&lt;br /&gt;
         This makes the test more effective against some devices/drivers&lt;br /&gt;
         But it reduces packet rate due to channel hopping.&lt;br /&gt;
      -c &amp;lt;chan&amp;gt;&lt;br /&gt;
         Fake an AP on channel &amp;lt;chan&amp;gt;. If you want your card to hop on&lt;br /&gt;
         this channel, you have to set -h option, too!&lt;br /&gt;
      -s &amp;lt;pps&amp;gt;&lt;br /&gt;
         Set speed in packets per second (Default: 50)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
a   - Authentication DoS mode&lt;br /&gt;
      Sends authentication frames to all APs found in range.&lt;br /&gt;
      Too much clients freeze or reset almost every AP.&lt;br /&gt;
      OPTIONS:&lt;br /&gt;
      -a &amp;lt;ap_mac&amp;gt;&lt;br /&gt;
         Only test the specified AP&lt;br /&gt;
      -m&lt;br /&gt;
         Use valid client MAC from OUI database&lt;br /&gt;
      -c&lt;br /&gt;
         Do NOT check for test being successful&lt;br /&gt;
      -i &amp;lt;ap_mac&amp;gt;&lt;br /&gt;
         Perform intelligent test on AP (-a and -c will be ignored)&lt;br /&gt;
         This test connects clients to the AP and reinjects sniffed data to keep them alive&lt;br /&gt;
      -s &amp;lt;pps&amp;gt;&lt;br /&gt;
         Set speed in packets per second (Default: unlimited)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;p   - Basic probing and ESSID Bruteforce mode&lt;br /&gt;
      Probes AP and check for answer, useful for checking if SSID has&lt;br /&gt;
      been correctly decloaked or if AP is in your adaptors sending range&lt;br /&gt;
      Use -f and -t option to enable SSID Bruteforcing.&lt;br /&gt;
      OPTIONS:&lt;br /&gt;
      -e &amp;lt;ssid&amp;gt;&lt;br /&gt;
         Tell mdk3 which SSID to probe for&lt;br /&gt;
      -f &amp;lt;filename&amp;gt;&lt;br /&gt;
         Read lines from file for bruteforcing hidden SSIDs&lt;br /&gt;
      -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
         Set MAC adress of target AP&lt;br /&gt;
      -s &amp;lt;pps&amp;gt;&lt;br /&gt;
         Set speed (Default: unlimited, in Bruteforce mode: 300)&lt;br /&gt;
      -b &amp;lt;character set&amp;gt;&lt;br /&gt;
         Use full Bruteforce mode (recommended for short SSIDs only!)&lt;br /&gt;
         Use this switch only to show its help screen.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
d   - Deauthentication / Disassociation Amok Mode&lt;br /&gt;
      Kicks everybody found from AP&lt;br /&gt;
      OPTIONS:&lt;br /&gt;
      -w &amp;lt;filename&amp;gt;&lt;br /&gt;
         Read file containing MACs not to care about (Whitelist mode)&lt;br /&gt;
      -b &amp;lt;filename&amp;gt;&lt;br /&gt;
         Read file containing MACs to run test on (Blacklist Mode)&lt;br /&gt;
      -s &amp;lt;pps&amp;gt;&lt;br /&gt;
         Set speed in packets per second (Default: unlimited)&lt;br /&gt;
      -c [chan,chan,chan,...]&lt;br /&gt;
         Enable channel hopping. Without providing any channels, mdk3 will hop an all&lt;br /&gt;
         14 b/g channels. Channel will be changed every 5 seconds.&lt;br /&gt;
      -d [target]&lt;br /&gt;
         Enable WPA/WPA2-Downgrade-Attack&lt;br /&gt;
         Blocks clients only if they use WPA Encryption, WEP and unencrypted traffic still works&lt;br /&gt;
         Use this test to see if the Sysadmin thinks WEP is still enough security when WPA &amp;quot;doesn't work&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
m   - Michael shutdown exploitation (TKIP)&lt;br /&gt;
      Cancels all traffic continuously&lt;br /&gt;
      -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
         Set Mac address of target AP&lt;br /&gt;
      -w &amp;lt;seconds&amp;gt;&lt;br /&gt;
         Seconds between bursts (Default: 10)&lt;br /&gt;
      -n &amp;lt;ppb&amp;gt;&lt;br /&gt;
         Set packets per burst (Default: 70)&lt;br /&gt;
      -j&lt;br /&gt;
         Use the new TKIP QoS-Exploit&lt;br /&gt;
         Needs just a few packets to shut AP down!&lt;br /&gt;
      -s &amp;lt;pps&amp;gt;&lt;br /&gt;
         Set speed (Default: 400)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
x   - 802.1X tests                                       &lt;br /&gt;
      0 - EAPOL Start packet flooding&lt;br /&gt;
            -n &amp;lt;ssid&amp;gt;&lt;br /&gt;
               Use SSID &amp;lt;ssid&amp;gt;&lt;br /&gt;
            -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
               Set MAC address of target AP&lt;br /&gt;
            -w &amp;lt;WPA type&amp;gt;&lt;br /&gt;
               Set WPA type (1: WPA, 2: WPA2/RSN; default: WPA)&lt;br /&gt;
            -u &amp;lt;unicast cipher&amp;gt;&lt;br /&gt;
               Set unicast cipher type (1: TKIP, 2: CCMP; default: TKIP)&lt;br /&gt;
            -m &amp;lt;multicast cipher&amp;gt;&lt;br /&gt;
               Set multicast cipher type (1: TKIP, 2: CCMP; default: TKIP)&lt;br /&gt;
            -s &amp;lt;pps&amp;gt;&lt;br /&gt;
               Set speed (Default: 400)&lt;br /&gt;
      1 - EAPOL Logoff test&lt;br /&gt;
            -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
               Set MAC address of target AP&lt;br /&gt;
            -c &amp;lt;bssid&amp;gt;&lt;br /&gt;
               Set MAC address of target STA&lt;br /&gt;
            -s &amp;lt;pps&amp;gt;&lt;br /&gt;
               Set speed (Default: 400)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
w   - WIDS/WIPS/WDS Confusion&lt;br /&gt;
      Confuses a WDS with multi-authenticated clients which messes up routing tables&lt;br /&gt;
      -e &amp;lt;SSID&amp;gt;&lt;br /&gt;
         SSID of target WDS network&lt;br /&gt;
      -c [chan,chan,chan...]&lt;br /&gt;
         Use channel hopping&lt;br /&gt;
      -z&lt;br /&gt;
         activate Zero_Chaos' WIDS exploit&lt;br /&gt;
         (authenticates clients from a WDS to foreign APs to make WIDS go nuts)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
f   - MAC filter bruteforce mode&lt;br /&gt;
      This test uses a list of known client MAC Adresses and tries to&lt;br /&gt;
      authenticate them to the given AP while dynamically changing&lt;br /&gt;
      its response timeout for best performance. It currently works only&lt;br /&gt;
      on APs who deny an open authentication request properly&lt;br /&gt;
      -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
         Target BSSID&lt;br /&gt;
      -m &amp;lt;mac&amp;gt;&lt;br /&gt;
         Set the MAC adress range to use (3 bytes, i.e. 00:12:34)&lt;br /&gt;
         Without -m, the internal database will be used&lt;br /&gt;
      -f &amp;lt;mac&amp;gt;&lt;br /&gt;
         Set the MAC adress to begin bruteforcing with&lt;br /&gt;
         (Note: You can't use -f and -m at the same time)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
g   - WPA Downgrade test&lt;br /&gt;
      deauthenticates Stations and APs sending WPA encrypted packets.&lt;br /&gt;
      With this test you can check if the sysadmin will try setting his&lt;br /&gt;
      network to WEP or disable encryption. mdk3 will let WEP and unencrypted&lt;br /&gt;
      clients work, so if the sysadmin simply thinks &amp;quot;WPA is broken&amp;quot; he&lt;br /&gt;
      sure isn't the right one for this job.&lt;br /&gt;
      (this can/should be combined with social engineering)&lt;br /&gt;
      -t &amp;lt;bssid&amp;gt;&lt;br /&gt;
         Target network&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fnord</name></author>	</entry>

	</feed>