nexmon – Blame information for rev 1

Subversion Repositories:
Rev:
Rev Author Line No. Line
1 office 1 .TH MDK3 8 "July 2010" "mdk3 v7"
2  
3 .SH NAME
4 mdk3 \- IEEE 802.11 PoC tool
5  
6 .SH SYNOPSIS
7 .B mdk3
8 [
9 .IR interface
10 ] [
11 .IR test_mode
12 ] [
13 .IR test_options
14 ]
15  
16 .SH DESCRIPTION
17 .I mdk3
18 is a proof-of-concept (PoC) tool to exploit common IEEE 802.11 protocol weaknesses.
19  
20 .SH OPTIONS
21  
22 .B a
23 - Authentication DoS
24 .br
25 Sends authentication frames to all APs found in range. Too many clients freeze or reset almost every AP.
26 .RS
27 .TP
28 .BI -a " ap_mac"
29 Only test an AP with the MAC address
30 .IR ap_mac
31 .TP
32 .BI -m
33 Use valid client MAC address from the OUI database
34 .TP
35 .BI -c
36 Do not check for the test being successful.
37 .TP
38 .BI -i " ap_mac"
39 Perform intelligent test on AP (-a and -c will be ignored): connect clients to an AP with the MAC address
40 .IR ap_mac
41 and reinjects sniffed data to keep them alive
42 .TP
43 .BI -s " rate"
44 Set speed in packets per second to
45 .IR rate
46 (Default: infinity)
47 .RE
48  
49 .B b
50 - Beacon Flood
51 .br
52 Sends beacon frames to show fake APs at clients. This can sometimes crash network scanners and even drivers!
53 .RS
54 .TP
55 .BI -n " ssid"
56 Use SSID
57 .IR ssid
58 instead of randomly generated ones
59 .TP
60 .BI -f " file"
61 Read SSIDs from
62 .IR file
63 instead of randomly generating them
64 .TP
65 .BI -v " file"
66 Read MACs and SSIDs from
67 .IR file
68 ; cf. example file
69 .TP
70 .BI -d
71 Show station as Ad-Hoc
72 .TP
73 .BI -w
74 Set WEP bit (generate encrypted networks)
75 .TP
76 .BI -g
77 Show stations as 802.11g (54 Mbit)
78 .TP
79 .BI -t
80 Show stations using WPA TKIP encryption
81 .TP
82 .BI -a
83 Show stations using WPA AES encryption
84 .TP
85 .BI -m
86 Use valid accesspoint MACs from OUI database
87 .TP
88 .BI -h
89 Hop to channel where AP is spoofed - this makes the test more effective against some devices/drivers, but it reduces packet rate due to channel hopping
90 .TP
91 .BI -c " chan"
92 Fake an AP on channel
93 .IR chan
94 \. If you want your card to hop on this channel, you have to set -h option, too!
95 .TP
96 .BI -s " rate"
97 Set speed in packets per second to
98 .IR rate
99 (Default: 50)
100 .RE
101  
102 .B d
103 - Deauthentication / Disassociation Amok Mode
104 .br
105 Kicks everybody found from AP.
106 .RS
107 .TP
108 .BI -w " file"
109 Read MACs from
110 .IR file
111 that are to be unaffected (whitelist mode)
112 .TP
113 .BI -b " file"
114 Read MACs from
115 .IR file
116 that are to be tested on (blacklist mode)
117 .TP
118 .BI -s " rate"
119 Set speed in packets per second to
120 .IR rate
121 (Default: infinity)
122 .TP
123 .BI -c " [chan_1,chan_2,...chan_n]"
124 Enable channel hopping. Without providing any channels, mdk3 will hop an all 14 b/g channels. The current channel will be changed every 5 seconds.
125 .RE
126  
127 .B f
128 - MAC Filter Bruteforce Mode
129 .br
130 This test uses a list of known client MAC addresses and tries to authenticate them to the given AP while dynamically changing the response timeout for best performance. It currently works only on APs which deny an open authentication request properly.
131 .RS
132 .TP
133 .BI -t " bssid"
134 Target
135 .IR bssid
136 .TP
137 .BI -m " mac_prefix"
138 Set the MAC adress range
139 .IR mac_prefix
140 (3 bytes, e.g. 00:12:34); without -m, the internal database will be used
141 .TP
142 .BI -f " mac"
143 Begin bruteforcing with MAC address
144 .IR mac
145 (Note: -f and -m cannot be used at the same time)
146 .RE
147  
148 .B g
149 - WPA Downgrade Test
150 .br
151 Deauthenticates Stations and APs sending WPA encrypted packets. With this test you can check if the sysadmin will try setting his network to WEP or disable encryption. mdk3 will let WEP and unencrypted clients work, so if the sysadmin simply thinks "WPA is broken" he sure isn't the right one for this job (this can/should be combined with social engineering).
152 .RS
153 .TP
154 .BI -t " bssid"
155 Target
156 .IR bssid
157 .RE
158  
159 .B m
160 - Michael Shutdown Exploitation (TKIP)
161 .br
162 Cancels all traffic continuously.
163 .RS
164 .TP
165 .BI -t " bssid"
166 Target
167 .IR bssid
168 .TP
169 .BI -w " time"
170 Time
171 .IR time
172 (in seconds) between bursts (Default: 10)
173 .TP
174 .BI -n " ppb"
175 Set packets per burst
176 .IR ppb
177 (Default: 70)
178 .TP
179 .BI -j
180 Use the new TKIP QoS-Exploit - needs just a few packets to shut the AP down!
181 .TP
182 .BI -s " rate"
183 Set speed in packets per second to
184 .IR rate
185 (Default: infinity)
186 .RE
187  
188 .B p
189 - Basic Probing and ESSID Bruteforce Mode
190 .br
191 Probes AP and check for answer, useful for checking if the SSID has been correctly decloaked or if AP is in your adaptor's sending range. Use -f and -t option to enable SSID Bruteforcing.
192 .RS
193 .TP
194 .BI -e " ssid"
195 Probe for
196 .IR bssid
197 .TP
198 .BI -f " file"
199 Read lines from
200 .IR file
201 for bruteforcing hidden SSIDs
202 .TP
203 .BI -t " bssid"
204 Target AP
205 .IR bssid
206 .TP
207 .BI -s " rate"
208 Set speed in packets per second to
209 .IR rate
210 (Normal Default: infinity; Bruteforce Default: 300)
211 .TP
212 .BI -b " character_set"
213 Use full Bruteforce mode based on
214 .IR character_set
215 (recommended for short SSIDs only!) - use this switch only to show its help screen
216 .RE
217  
218 .B w
219 - WIDS/WIPS/WDS Confusion
220 .br
221 Confuses a WDS with multi-authenticated clients, which messes up routing tables.
222 .RS
223 .TP
224 .BI -e " ssid"
225 SSID
226 .IR ssid
227 of target WDS network
228 .TP
229 .BI -c " [chan_1,chan_2,...chan_n]"
230 Enable channel hopping.
231 .TP
232 .BI -z
233 activate Zero_Chaos' WIDS exploit (authenticates clients from a WDS to foreign APs to make WIDS go nuts)
234 .RE
235  
236 .B x
237 - 802.1X tests
238 .RS
239  
240 .RS
241 .TP
242 .BI -n " ssid"
243 Use SSID
244 .IR ssid
245 .TP
246 .BI -t " bssid"
247 Target AP
248 .IR bssid
249 .TP
250 .BI -w " WPA_type"
251 Set WPA type to
252 .IR WPA_type
253 (1: WPA, 2: WPA2/RSN; default: WPA)
254 .TP
255 .BI -u " unicast_cipher_type"
256 Set unicast cipher type to
257 .IR unicast_cipher_type
258 (1: TKIP, 2: CCMP; default: TKIP)
259 .TP
260 .BI -m " multicast_cipher_type"
261 Set multicast cipher type to
262 .IR multicast_cipher_type
263 (1: TKIP, 2: CCMP; default: TKIP)
264 .TP
265 .BI -s " rate"
266 Set speed in packets per second to
267 .IR rate
268 (Default: 400)
269  
270 .RE
271 1 - EAPOL Logoff test
272 .RS
273 .TP
274 .BI -t " ssid"
275 Set target AP MAC address to
276 .IR ssid
277 .TP
278 .BI -c " bssid"
279 Set target STA MAC address to
280 .IR bssid
281 .TP
282 .BI -s " rate"
283 Set speed in packets per second to
284 .IR rate
285 (Default: 400)
286 .RE
287 .RE
288  
289 .SH AUTHORS
290 .I mdk3
291 was written by Pedro Larbig (ASPj) with contributions from the aircrack-ng community: Antragon, moongray, Ace, Zero_Chaos, Hirte, thefkboss, ducttape, telek0miker, Le_Vert, sorbo, Andy Green, bahathir, Dawid Gajownik and Ruslan Nabioullin.