Results (
Vietnamese) 1:
[Copy]Copied!
SSID Flooding with MDK3 One neat trick that MDK3 can do is SSID flooding,or beacon flooding. What this means is that MDK3can broadcast hundreds or even thousands of fakeaccess points. Others that are in the area will seeall of these fake access points when they go tosearch for WiFi access points to connect to. As you can probably see, SSID flooding is not denial ofservice. However, this is still a pretty cool trick.Potentially, you could set up a dedicated computerwith a wireless access point and have MDK3running in SSID flooding mode at all times. Youcould, in effect, hide your legitimate wireless access point in a sea of fake access points. A sort ofsecurity through obscurity to prevent WiFi hackingattacks. Here is the syntax to enable simple SSID flooding(MDK3 will generate random fake access pointnames: mdk3 b -c 1 Just replace with the name of yourwireless interface. Remember, usually it’s monO. The b option tells MDK3 to use beacon/SSID flooding mode. -c1 tells MDK3 to broadcast all the fake access points on channel 1. (To better hide the fact theseare all fake access points, you can try runningmultiple instances of MDK3 and specify a differentchannel each time. You can also specify a list of specific SSID namesfrom a file by appending the command above with: -f Let’s say your business’s wireless AP broadcastsas “ACME Business”. You want to use MDK3’sSSID flooding mode to hide your access pointamongst a bunch of similarly named but decoyaccess points. You could create a text file named“SSIDs” and fill with fake access point names, perhaps names like “ACME WiFi” “ACME Network”“WiFi ACME”. Then, to bring this all together, youcan simply run: mdk3 b -c 1 -f SSIDs There are tons of possible options for the SSIDflooding mode:
Being translated, please wait..