Kali Linux - 使用MDK3搭建WiFi

0x01 原由linux

前段時間一個好基友找我,跟我說想跟一個心儀好久的女孩表白,想讓我給他整一個高大上的表白方式,數據庫

基友脫單固然是力挺啊,我就想到了現代人不可缺乏的WiFi,可是按照普通的教程,釣魚WiFi只能搭建一個sass

既然是表白這種事情,固然要越震撼越好啊,百度了一番以後,我找到了最終合適的工具 - mdk3工具

0x02 簡介測試

MDK3 是一款無線DOS 攻擊測試工具,可以發起Beacon Flood、Authentication DoS、Deauthentication/Disassociation Amok 等模式的攻擊,this

另外它還具備針對隱藏ESSID 的暴力探測模式、802.1X 滲透測試、WIDS干擾等功能,能夠說是WiFi攻擊中比較實用的一款工具了,spa

今天咱們的目標是:創建大量垃圾WiFi來給嫂子表白(爲何用嫂子這個詞很少解釋)code

咱們先來簡單瞭解一下md3的一些命令,打開終端,輸入mdk3 --helporm

root@kali-linux:~# mdk3 --help

MDK 3.0 v6 - "Yeah, well, whatever"
by ASPj of k2wrlz, using the osdep library from aircrack-ng
And with lots of help from the great aircrack-ng community:
Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape,
telek0miker, Le_Vert, sorbo, Andy Green, bahathir and Dawid Gajownik
THANK YOU!

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.
IMPORTANT: It is your responsibility to make sure you have permission from the
network owner before running MDK against it.

This code is licenced under the GPLv2

MDK USAGE:
mdk3 <interface> <test_mode> [test_options]

Try mdk3 --fullhelp for all test options
Try mdk3 --help <test_mode> for info about one test only

TEST MODES:
b   - Beacon Flood Mode
      Sends beacon frames to show fake APs at clients.
      This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
      Sends authentication frames to all APs found in range.
      Too much clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
      Probes AP and check for answer, useful for checking if SSID has
      been correctly decloaked or if AP is in your adaptors sending range
      SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
      Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
      Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
      Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
      This test uses a list of known client MAC Addresses and tries to
      authenticate them to the given AP while dynamically changing
      its response timeout for best performance. It currently works only
      on APs who deny an open authentication request properly
g   - WPA Downgrade test
      deauthenticates Stations and APs sending WPA encrypted packets.
      With this test you can check if the sysadmin will try setting his
      network to WEP or disable encryption.

好吧,其實有簡化版本的說明,不過留着上面的一大段英文顯得筆者逼格比較高blog

mdk3 mon b
       -n <ssid> //自定義ESSID
       -f <filename>  //讀取ESSID列表文件
       -v <filename>  //自定義ESSID和BSSID對應列表文字
       -d  //自定義爲Ad-Hoc模式
       -w  //自定義爲wep模式
       -g  //54Mbit模式
       -t  //WPA TKIP encryption
       -a  //WPA AES encryption
       -m //讀取數據庫Mac地址
       -c <chan>  //自定義信道
       -s <pps>  //發包速率

以上即是咱們今天要用到mdk3 B類型攻擊方式的經常使用參數了,咱們接下來開始表白之旅

0x03 表白

首先咱們先開啓網卡監聽模式:

airmon-ng start wlan0<無線網卡名稱>

這裏個人無線網卡名稱是wlan0,你們須要根據本身無線網卡的名稱更改

而後咱們輸入ifconfig查看網卡是否開啓了監聽模式,即查看網卡名後是否增長了mon

root@kali-linux:~# ifconfig
wlan0mon: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        unspec 60-57-18-BD-94-99-30-30-00-00-00-00-00-00-00-00  txqueuelen 1000  (UNSPEC)
        RX packets 59  bytes 6198 (6.0 KiB)
        RX errors 0  dropped 59  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

這裏能夠看到咱們的網卡已經開啓監聽模式了

而後咱們就要先在一個文本羅列出一個垃圾WiFi的名稱

咱們在根目錄下寫入一個文本:

leafpad wifiname

而後我在wifiname這個文本中寫入了表白的內容,以後Ctrl+S保存文件

PS:這裏要注意,咱們自定義的WiFi名稱不能重複,不然只會創建一個WiFi,最好的解決方法是在名稱後面加上數字,好比,我愛你1,我愛你2等等,其次每輸入好一個WiFi名稱後須要回車,在第二行輸入第二個WiFi名稱,不然這些名稱就會擠在一個WiFi名稱中

以後咱們開始表白:

mdk3 wlan0mon b -c 6 -s 1000 -f ./wifinam
//wlan0mon  -->開啓監聽模式的無線網卡名稱
//b         -->mdk3工具B型攻擊
//-c 6    -->向信頻6發送大量SSID
//-s 1000    -->向這個信頻每秒廣播1000個數據
//-f ./wifiname     -->自定義WiFi名稱(即SSID)文件路徑

而後咱們稍等片刻,打開手機檢測WiFi就能看到咱們的表白信息了

固然,此次基友的表白結果固然是被我佔了風頭,那個妹子要走了個人手機號。。。。。。

因此如今我是在醫院的病牀上單手打字,旁邊一個兇漢一臉憤怒的盯着我= =

相關文章
相關標籤/搜索