Provided by: mdk4_4.1+git20190904-1_amd64 bug

NAME

       mdk4 - IEEE 802.11 PoC tool

SYNOPSIS

       mdk4 [ interface ] [ test_mode ] [ test_options ]

DESCRIPTION

       mdk4 is a proof-of-concept (PoC) tool to exploit common IEEE 802.11 protocol weaknesses.

OPTIONS

       a - Authentication DoS
       Sends  authentication  frames  to all APs found in range. Too many clients freeze or reset
       almost every AP.

              -a ap_mac
                     Only test an AP with the MAC address ap_mac

              -m     Use valid client MAC address from the OUI database

              -c     Do not check for the test being successful.

              -i ap_mac
                     Perform intelligent test on AP (-a and -c will be ignored): connect  clients
                     to an AP with the MAC address ap_mac and reinjects sniffed data to keep them
                     alive

              -s rate
                     Set speed in packets per second to rate (Default: infinity)

       b - Beacon Flood
       Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners
       and even drivers!

              -n ssid
                     Use SSID ssid instead of randomly generated ones

              -f file
                     Read SSIDs from file instead of randomly generating them

              -v file
                     Read MACs and SSIDs from file ; cf. example file

              -d     Show station as Ad-Hoc

              -w     Set WEP bit (generate encrypted networks)

              -g     Show stations as 802.11g (54 Mbit)

              -t     Show stations using WPA TKIP encryption

              -a     Show stations using WPA AES encryption

              -m     Use valid accesspoint MACs from OUI database

              -h     Hop  to  channel  where  AP  is spoofed - this makes the test more effective
                     against some devices/drivers, but it reduces  packet  rate  due  to  channel
                     hopping

              -c chan
                     Fake an AP on channel chan If you want your card to hop on this channel, you
                     have to set -h option, too!

              -s rate
                     Set speed in packets per second to rate (Default: 50)

       d - Deauthentication / Disassociation Amok Mode
       Kicks everybody found from AP.

              -w file
                     Read MACs from file that are to be unaffected (whitelist mode)

              -b file
                     Read MACs from file that are to be tested on (blacklist mode)

              -s rate
                     Set speed in packets per second to rate (Default: infinity)

              -c [chan_1,chan_2,...chan_n]
                     Enable channel hopping. Without providing any channels, mdk4 will hop an all
                     14 b/g channels. The current channel will be changed every 5 seconds.

       f - MAC Filter Bruteforce Mode
       This  test uses a list of known client MAC addresses and tries to authenticate them to the
       given AP while  dynamically  changing  the  response  timeout  for  best  performance.  It
       currently works only on APs which deny an open authentication request properly.

              -t bssid
                     Target bssid

              -m mac_prefix
                     Set  the  MAC address range mac_prefix (3 bytes, e.g. 00:12:34); without -m,
                     the internal database will be used

              -f mac Begin bruteforcing with MAC address mac (Note: -f and -m cannot be  used  at
                     the same time)

       g - WPA Downgrade Test
       Deauthenticates  Stations  and  APs  sending WPA encrypted packets. With this test you can
       check if the sysadmin will try setting his network to WEP or disable encryption. mdk4 will
       let  WEP and unencrypted clients work, so if the sysadmin simply thinks "WPA is broken" he
       sure isn't  the  right  one  for  this  job  (this  can/should  be  combined  with  social
       engineering).

              -t bssid
                     Target bssid

       m - Michael Shutdown Exploitation (TKIP)
       Cancels all traffic continuously.

              -t bssid
                     Target bssid

              -w time
                     Time time (in seconds) between bursts (Default: 10)

              -n ppb Set packets per burst ppb (Default: 70)

              -j     Use the new TKIP QoS-Exploit - needs just a few packets to shut the AP down!

              -s rate
                     Set speed in packets per second to rate (Default: infinity)

       p - Basic Probing and ESSID Bruteforce Mode
       Probes  AP  and  check  for  answer,  useful  for  checking if the SSID has been correctly
       decloaked or if AP is in your adaptor's sending range. Use -f and -t option to enable SSID
       Bruteforcing.

              -e ssid
                     Probe for bssid

              -f file
                     Read lines from file for bruteforcing hidden SSIDs

              -t bssid
                     Target AP bssid

              -s rate
                     Set  speed  in  packets  per  second  to  rate  (Normal  Default:  infinity;
                     Bruteforce Default: 300)

              -b character_set
                     Use full Bruteforce mode based on character_set (recommended for short SSIDs
                     only!) - use this switch only to show its help screen

       w - WIDS/WIPS/WDS Confusion
       Confuses a WDS with multi-authenticated clients, which messes up routing tables.

              -e ssid
                     SSID ssid of target WDS network

              -c [chan_1,chan_2,...chan_n]
                     Enable channel hopping.

              -z     activate  Zero_Chaos'  WIDS  exploit  (authenticates  clients  from a WDS to
                     foreign APs to make WIDS go nuts)

       x - 802.1X tests
              0 - EAPOL Start packet flooding

                     -n ssid
                            Use SSID ssid

                     -t bssid
                            Target AP bssid

                     -w WPA_type
                            Set WPA type to WPA_type (1: WPA, 2: WPA2/RSN; default: WPA)

                     -u unicast_cipher_type
                            Set unicast cipher type to unicast_cipher_type  (1:  TKIP,  2:  CCMP;
                            default: TKIP)

                     -m multicast_cipher_type
                            Set multicast cipher type to multicast_cipher_type (1: TKIP, 2: CCMP;
                            default: TKIP)

                     -s rate
                            Set speed in packets per second to rate (Default: 400)

              1 - EAPOL Logoff test

                     -t ssid
                            Set target AP MAC address to ssid

                     -c bssid
                            Set target STA MAC address to bssid

                     -s rate
                            Set speed in packets per second to rate (Default: 400)

AUTHORS

       mdk4 was written by E7mer, Pedro Larbig (ASPj) with  contributions  from  the  aircrack-ng
       community:  Antragon,  moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker,
       Le_Vert, sorbo, Andy Green, bahathir, Dawid Gajownik and Ruslan Nabioullin.