Provided by: mdk4_4.1+git20190904-1_amd64 

NAME
mdk4 - IEEE 802.11 PoC tool
SYNOPSIS
mdk4 [ interface ] [ test_mode ] [ test_options ]
DESCRIPTION
mdk4 is a proof-of-concept (PoC) tool to exploit common IEEE 802.11 protocol weaknesses.
OPTIONS
a - Authentication DoS Sends authentication frames to all APs found in range. Too many clients freeze or reset almost every AP. -a ap_mac Only test an AP with the MAC address ap_mac -m Use valid client MAC address from the OUI database -c Do not check for the test being successful. -i ap_mac Perform intelligent test on AP (-a and -c will be ignored): connect clients to an AP with the MAC address ap_mac and reinjects sniffed data to keep them alive -s rate Set speed in packets per second to rate (Default: infinity) b - Beacon Flood Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even drivers! -n ssid Use SSID ssid instead of randomly generated ones -f file Read SSIDs from file instead of randomly generating them -v file Read MACs and SSIDs from file ; cf. example file -d Show station as Ad-Hoc -w Set WEP bit (generate encrypted networks) -g Show stations as 802.11g (54 Mbit) -t Show stations using WPA TKIP encryption -a Show stations using WPA AES encryption -m Use valid accesspoint MACs from OUI database -h Hop to channel where AP is spoofed - this makes the test more effective against some devices/drivers, but it reduces packet rate due to channel hopping -c chan Fake an AP on channel chan If you want your card to hop on this channel, you have to set -h option, too! -s rate Set speed in packets per second to rate (Default: 50) d - Deauthentication / Disassociation Amok Mode Kicks everybody found from AP. -w file Read MACs from file that are to be unaffected (whitelist mode) -b file Read MACs from file that are to be tested on (blacklist mode) -s rate Set speed in packets per second to rate (Default: infinity) -c [chan_1,chan_2,...chan_n] Enable channel hopping. Without providing any channels, mdk4 will hop an all 14 b/g channels. The current channel will be changed every 5 seconds. f - MAC Filter Bruteforce Mode This test uses a list of known client MAC addresses and tries to authenticate them to the given AP while dynamically changing the response timeout for best performance. It currently works only on APs which deny an open authentication request properly. -t bssid Target bssid -m mac_prefix Set the MAC address range mac_prefix (3 bytes, e.g. 00:12:34); without -m, the internal database will be used -f mac Begin bruteforcing with MAC address mac (Note: -f and -m cannot be used at the same time) g - WPA Downgrade Test Deauthenticates Stations and APs sending WPA encrypted packets. With this test you can check if the sysadmin will try setting his network to WEP or disable encryption. mdk4 will let WEP and unencrypted clients work, so if the sysadmin simply thinks "WPA is broken" he sure isn't the right one for this job (this can/should be combined with social engineering). -t bssid Target bssid m - Michael Shutdown Exploitation (TKIP) Cancels all traffic continuously. -t bssid Target bssid -w time Time time (in seconds) between bursts (Default: 10) -n ppb Set packets per burst ppb (Default: 70) -j Use the new TKIP QoS-Exploit - needs just a few packets to shut the AP down! -s rate Set speed in packets per second to rate (Default: infinity) p - Basic Probing and ESSID Bruteforce Mode Probes AP and check for answer, useful for checking if the SSID has been correctly decloaked or if AP is in your adaptor's sending range. Use -f and -t option to enable SSID Bruteforcing. -e ssid Probe for bssid -f file Read lines from file for bruteforcing hidden SSIDs -t bssid Target AP bssid -s rate Set speed in packets per second to rate (Normal Default: infinity; Bruteforce Default: 300) -b character_set Use full Bruteforce mode based on character_set (recommended for short SSIDs only!) - use this switch only to show its help screen w - WIDS/WIPS/WDS Confusion Confuses a WDS with multi-authenticated clients, which messes up routing tables. -e ssid SSID ssid of target WDS network -c [chan_1,chan_2,...chan_n] Enable channel hopping. -z activate Zero_Chaos' WIDS exploit (authenticates clients from a WDS to foreign APs to make WIDS go nuts) x - 802.1X tests 0 - EAPOL Start packet flooding -n ssid Use SSID ssid -t bssid Target AP bssid -w WPA_type Set WPA type to WPA_type (1: WPA, 2: WPA2/RSN; default: WPA) -u unicast_cipher_type Set unicast cipher type to unicast_cipher_type (1: TKIP, 2: CCMP; default: TKIP) -m multicast_cipher_type Set multicast cipher type to multicast_cipher_type (1: TKIP, 2: CCMP; default: TKIP) -s rate Set speed in packets per second to rate (Default: 400) 1 - EAPOL Logoff test -t ssid Set target AP MAC address to ssid -c bssid Set target STA MAC address to bssid -s rate Set speed in packets per second to rate (Default: 400)
AUTHORS
mdk4 was written by E7mer, Pedro Larbig (ASPj) with contributions from the aircrack-ng community: Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker, Le_Vert, sorbo, Andy Green, bahathir, Dawid Gajownik and Ruslan Nabioullin.