Provided by: mdk4_4.1+git20190904-1_amd64 

NAME
mdk4 - IEEE 802.11 PoC tool
SYNOPSIS
mdk4 [ interface ] [ test_mode ] [ test_options ]
DESCRIPTION
mdk4 is a proof-of-concept (PoC) tool to exploit common IEEE 802.11 protocol weaknesses.
OPTIONS
a - Authentication DoS
Sends authentication frames to all APs found in range. Too many clients freeze or reset almost every AP.
-a ap_mac
Only test an AP with the MAC address ap_mac
-m Use valid client MAC address from the OUI database
-c Do not check for the test being successful.
-i ap_mac
Perform intelligent test on AP (-a and -c will be ignored): connect clients to an AP with
the MAC address ap_mac and reinjects sniffed data to keep them alive
-s rate
Set speed in packets per second to rate (Default: infinity)
b - Beacon Flood
Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even
drivers!
-n ssid
Use SSID ssid instead of randomly generated ones
-f file
Read SSIDs from file instead of randomly generating them
-v file
Read MACs and SSIDs from file ; cf. example file
-d Show station as Ad-Hoc
-w Set WEP bit (generate encrypted networks)
-g Show stations as 802.11g (54 Mbit)
-t Show stations using WPA TKIP encryption
-a Show stations using WPA AES encryption
-m Use valid accesspoint MACs from OUI database
-h Hop to channel where AP is spoofed - this makes the test more effective against some
devices/drivers, but it reduces packet rate due to channel hopping
-c chan
Fake an AP on channel chan If you want your card to hop on this channel, you have to set -h
option, too!
-s rate
Set speed in packets per second to rate (Default: 50)
d - Deauthentication / Disassociation Amok Mode
Kicks everybody found from AP.
-w file
Read MACs from file that are to be unaffected (whitelist mode)
-b file
Read MACs from file that are to be tested on (blacklist mode)
-s rate
Set speed in packets per second to rate (Default: infinity)
-c [chan_1,chan_2,...chan_n]
Enable channel hopping. Without providing any channels, mdk4 will hop an all 14 b/g
channels. The current channel will be changed every 5 seconds.
f - MAC Filter Bruteforce Mode
This test uses a list of known client MAC addresses and tries to authenticate them to the given AP while
dynamically changing the response timeout for best performance. It currently works only on APs which deny
an open authentication request properly.
-t bssid
Target bssid
-m mac_prefix
Set the MAC address range mac_prefix (3 bytes, e.g. 00:12:34); without -m, the internal
database will be used
-f mac Begin bruteforcing with MAC address mac (Note: -f and -m cannot be used at the same time)
g - WPA Downgrade Test
Deauthenticates Stations and APs sending WPA encrypted packets. With this test you can check if the
sysadmin will try setting his network to WEP or disable encryption. mdk4 will let WEP and unencrypted
clients work, so if the sysadmin simply thinks "WPA is broken" he sure isn't the right one for this job
(this can/should be combined with social engineering).
-t bssid
Target bssid
m - Michael Shutdown Exploitation (TKIP)
Cancels all traffic continuously.
-t bssid
Target bssid
-w time
Time time (in seconds) between bursts (Default: 10)
-n ppb Set packets per burst ppb (Default: 70)
-j Use the new TKIP QoS-Exploit - needs just a few packets to shut the AP down!
-s rate
Set speed in packets per second to rate (Default: infinity)
p - Basic Probing and ESSID Bruteforce Mode
Probes AP and check for answer, useful for checking if the SSID has been correctly decloaked or if AP is
in your adaptor's sending range. Use -f and -t option to enable SSID Bruteforcing.
-e ssid
Probe for bssid
-f file
Read lines from file for bruteforcing hidden SSIDs
-t bssid
Target AP bssid
-s rate
Set speed in packets per second to rate (Normal Default: infinity; Bruteforce Default: 300)
-b character_set
Use full Bruteforce mode based on character_set (recommended for short SSIDs only!) - use
this switch only to show its help screen
w - WIDS/WIPS/WDS Confusion
Confuses a WDS with multi-authenticated clients, which messes up routing tables.
-e ssid
SSID ssid of target WDS network
-c [chan_1,chan_2,...chan_n]
Enable channel hopping.
-z activate Zero_Chaos' WIDS exploit (authenticates clients from a WDS to foreign APs to make
WIDS go nuts)
x - 802.1X tests
0 - EAPOL Start packet flooding
-n ssid
Use SSID ssid
-t bssid
Target AP bssid
-w WPA_type
Set WPA type to WPA_type (1: WPA, 2: WPA2/RSN; default: WPA)
-u unicast_cipher_type
Set unicast cipher type to unicast_cipher_type (1: TKIP, 2: CCMP; default: TKIP)
-m multicast_cipher_type
Set multicast cipher type to multicast_cipher_type (1: TKIP, 2: CCMP; default: TKIP)
-s rate
Set speed in packets per second to rate (Default: 400)
1 - EAPOL Logoff test
-t ssid
Set target AP MAC address to ssid
-c bssid
Set target STA MAC address to bssid
-s rate
Set speed in packets per second to rate (Default: 400)
AUTHORS
mdk4 was written by E7mer, Pedro Larbig (ASPj) with contributions from the aircrack-ng community:
Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker, Le_Vert, sorbo, Andy Green,
bahathir, Dawid Gajownik and Ruslan Nabioullin.
mdk4 v1 February 2018 MDK4(1)