Ready to Start Your Career?

By: Invoron 'norovni'
March 16, 2017
Aireplay Vs Mdk3: Wireless Deauthentication

By: Invoron 'norovni'
March 16, 2017
I am pretty sure anyone who has ever tried to hack wireless network should have come across aireplay-ng (one among aircrack-ng suite), very few may have heard about mdk3. Similar to aireplay-ng, mdk3 can be used to Jam a wireless network exploiting IEEE 802.11 protocol weakness. In this article lets talk on how to use them and jump to some conclusions.1. Aireplay-ngsyntax : aireplay-ng <options> <replay interface>Sample Example: aireplay-ng --deauth n -a <MAC of AP> -e <ESSID of AP> -c <Client MAC> <Monitor Interface>aireplay-ng --deauth 5 -a 00:11:22:33:44:55 -e HackThis -c 1c:65:9d:9e:02:07 wlan0monHere :
- --deauth = <For Attack Mode> In this case for de-authentication ; equivalent to -0
- n = <Number Of Attack Packets> Here 5 is selected. Sends 5 de-authentication packets.
- -a = <BSSID or MAC of Access Point> Here lets just say 00:11:22:33:44:55 is the MAC of AP.
- -e = <ESSID of MAC > Optional ; Lets just say WiFi name is "HackThis".
- -c = <MAC of Client connected> Optional ; Works better if you indicate a client with the command.
- Monitor Interface = The Interface that you set to monitor mode using airmon-ng ; check status with "iwconfig"
- Monitor Interface = The Interface that you set to monitor mode using airmon-ng; check status with "iwconfig"
- d = <Deauthentication / Disassociation Amok Mode> Kicks out everybody found from AP.
- b = <Test Mode> Becon Flood Mode; Sends beacon frames to show fake APs at clients.
- blacklist.txt = A file with BSSID of Target network ; simply create it with "echo 00:11:22:33:44:55 > blacklist.txt"
- c = <Channel> Specify which channel is the AP on. It switches to the specified channel if the interface is on the other channel. (aireplay-ng gives an error if the channel is mismatched)