SSID Flooding with MDK3 One neat trick that MDK3 can do is SSID flooding,
or beacon flooding. What this means is that MDK3
can broadcast hundreds or even thousands of fake
access points. Others that are in the area will see
all of these fake access points when they go to
search for WiFi access points to connect to. As you can probably see, SSID flooding is not denial of
service. However, this is still a pretty cool trick.
Potentially, you could set up a dedicated computer
with a wireless access point and have MDK3
running in SSID flooding mode at all times. You
could, in effect, hide your legitimate wireless access point in a sea of fake access points. A sort of
security through obscurity to prevent WiFi hacking
attacks. Here is the syntax to enable simple SSID flooding
(MDK3 will generate random fake access point
names: mdk3 b -c 1 Just replace with the name of your
wireless interface. Remember, usually it’s monO. The b option tells MDK3 to use beacon/SSID flooding mode. -c1 tells MDK3 to broadcast all the fake access points on channel 1. (To better hide the fact these
are all fake access points, you can try running
multiple instances of MDK3 and specify a different
channel each time. You can also specify a list of specific SSID names
from a file by appending the command above with: -f Let’s say your business’s wireless AP broadcasts
as “ACME Business”. You want to use MDK3’s
SSID flooding mode to hide your access point
amongst a bunch of similarly named but decoy
access points. You could create a text file named
“SSIDs” and fill with fake access point names, perhaps names like “ACME WiFi” “ACME Network”
“WiFi ACME”. Then, to bring this all together, you
can simply run: mdk3 b -c 1 -f SSIDs There are tons of possible options for the SSID
flooding mode:
Results (
Chinese) 1:
[Copy]Copied!
SSID Flooding with MDK3 One neat trick that MDK3 can do is SSID flooding,or beacon flooding. What this means is that MDK3can broadcast hundreds or even thousands of fakeaccess points. Others that are in the area will seeall of these fake access points when they go tosearch for WiFi access points to connect to. As you can probably see, SSID flooding is not denial ofservice. However, this is still a pretty cool trick.Potentially, you could set up a dedicated computerwith a wireless access point and have MDK3running in SSID flooding mode at all times. Youcould, in effect, hide your legitimate wireless access point in a sea of fake access points. A sort ofsecurity through obscurity to prevent WiFi hackingattacks. Here is the syntax to enable simple SSID flooding(MDK3 will generate random fake access pointnames: mdk3 b -c 1 Just replace with the name of yourwireless interface. Remember, usually it’s monO. The b option tells MDK3 to use beacon/SSID flooding mode. -c1 tells MDK3 to broadcast all the fake access points on channel 1. (To better hide the fact theseare all fake access points, you can try runningmultiple instances of MDK3 and specify a differentchannel each time. You can also specify a list of specific SSID namesfrom a file by appending the command above with: -f Let’s say your business’s wireless AP broadcastsas “ACME Business”. You want to use MDK3’sSSID flooding mode to hide your access point其中一群同样命名但诱饵接入点。您可以创建一个名为文本文件"Ssid"和填充与假访问点名称,也许像"ACME WiFi""ACME 网络"的名称"WiFi 到极致"。然后,要把这个带在一起,你可以简单地运行: mdk3 b-c 1-f Ssid 有非常多的 SSID 的可能备选办法水浸的模式:
Being translated, please wait..
