Results (
Vietnamese) 1:
[Copy]Copied!
THIS LINK “https://www.youtube.com/watch? v=hHVPSJn4Fqo” HAS A VIDEO I HAVE DONE TO SHOW HOW I USE THE TWO ATTACKS ANDWHICH ONE WAS MORE EFFECTIVE WITH THISPARTICULAR AP. BRIEF NOTESI focused on the stated Cisco Access Point that Icame across with the new exponential wpsmechanism. THE TWO ATTACKS I USED ARE:1. MDK3 Authentication DOS Flood Attack- floodsthe AP with too much fake clients so that the routeris overloaded2. EAPOL Start Flood Attack- Authenticates to theAP and sends too much EAPOL Start requests so that the router is unable to respond to the volume ofEAPOL requests and reboot itself. MDK3 AUTHENTICATION DOS FLOOD ATTACKThis attack is useful on SOME routers. Theimportant point to note is HOW I USE THESEATTACKS!.( I have three wireless adapter- AWUS036NHA,AWUS036NH and TP-LINK 722N and I use AWUS036NHA and AWUS036NH to carry out thisattack numerous times)HOW I ATTACKED THIS ACCESS POINT USINGAUTHENTICATION DOS FLOOD ATTACKI started my wireless card on three monitorinterface, mon0, mon1 and mon2 In three terminal, I use the command linemdk3 mon0 a –a C87:19:0A:BF:35 #TERMINAL 1mdk3 mon1 a –a " " " # TERMINAL 2mdk3 mon1 a –a " " " #TERMINAL 3Note:I ensure that the router was wps locked permanently so that I can test the effectiveness ofthe attack. Also, a point to note, I did not use onecommand line with one monitor interface since itwas futile. I blasted the router on three monitorinterfaces!.Now I am blasting away the router forhours!. After blasting away the Access Point is still locked! I tried this attack for days to convincemyself!. MDK3 EAPOL START FLOOD ATTACKI started my wireless card on three monitorinterface, mon0, mon1 and mon2mdk3 mon1 x 0 –t C87:19:0A:BF:35 –n Riznet –s100 #TERMINAL 1 (SEE VIDEO FOR REASONOF USING –S 100 FLAG) mdk3 mon1 x 0 –t " " " –n Riznet –s 100 #TERMINAL 2mdk3 mon1 x 0 –t " " " –n Riznet –s 100 #TERMINAL 3Note: I tried again using 1 monitor interface to carryout the attack but it took hours for the router to reboot and I was not sure if the attack was themain reason for the router rebooting!. In thisscenario I tried blasting the router in threeterminals. This “Shock Attack” method ran forabout 20 seconds and the router reboot with wpslocked status as “NO”. I TRIED THIS ATTACK A COUPLE MORE TIMES FOR ABOUT 20SECONDS WITH THE ACCESS POINTREBOOTING AND UNLOCKING ITSELF (WPS) !!.Also packet analysis significantly helped me tounderstand the connection between EAPOL and arouter behavior to open authentication request which makes it impossible to stick to one methodfor flooding ALL AP (see the video link above). BASH SCRIPT WRITINGSoon I will write a bash script to execute all thesteps in my video (I need time to chill….). OTHER ACCESS POINTS INVESTIGATEDI Have Also Assessed The Behaviour Of ThreeOther Cisco Access Points That Rate Limit Pin In
A Systematic Way But Did Not Locked Up in an
exponential manner!. I will give gave an update if I
do come across any other access points that behaved somewhat different. Do share your
experience in relation to any new updates on wps! Apr 16, 2014 #6 repzerow...@gmail.com TO: EVERYONE-THREE OTHER ACCESS
POINTS THAT WERE DEFEATED BY THE MDK3
EAPOL START ATTACK!! I have underestimated this attack!. IT WORKS ON
ALMOST ALL THE AP THAT I PICKED UP THAT
HAS THE WPS RATE LIMITING
FEATURE..Despite some AP refuses to accept to
many eapol packets, one mdk3 authenticates it
floods the AP quickly until a deauthentication packet is sent from the AP to break the connection.
FOR FURTHER PROOF CHECK ANOTHER
VIDEO IS POST ON MY CHANNEL LINK https:// www.youtube.com/watch?v=_uVv...ature=youtu.be Also, instead of running three attacks in three
terminal, i used one terminal to carry out three
attacks using EXAMPLE
#timeout mdk3 mon0 x 0 -t -n
-s & timeout
mdk3 mon1 x 0 -t -n -
s mdk3
mon2 x 0 -t -n -s PENDING: I AM CURRENTLY WRITTING A
GENERAL INTERACTIVE BASH SCRIPT TO
CARRY OUT ANY MDK3 ATTACK USING MY
METHOD WITH REAVER! I WILL POST ONCE
FULLY FINSHED.
IF ANYONE HAS A SCRIPT FOR REAVER AND MDK3 (TO CARRY OUT ANY ATTACKS) DO
SHARE SO THAT I CAN COMPARE IT WITH MY
WORK IN PROGRESS SCRIPT! Apr 18, 2014 #7 repzerow...@gmail.com check out ANOTHER video that showed how the
EAPOL Start flood attack caused two other access
points to unlock WPS status to "NO" ! LINK https://www.youtube.com/watch?v=_uVvi8qf7JY Apr 28, 2014 #8 cln...@gmail.com hello repzerow...@yahoo.com This doesn't work for me Apr 30, 2014 #9 repzerow...@gmail.com TO: cln...@gmail.com are you getting alot of "Failed authentication with
the mdk3 eapol start flood attack? then it can be an
authentication problem due to signal strength.
failing to authenticate to the Access Point= failing
to flood the AP with this attack Aug 18, 2014 #10 nerv...@gmail.com no me funcionaaaaaaaaaa Aug 24, 2014 #11 Nils.Ave...@gmail.com Hey repzerow, any chance you finished your script?
Greatly appreciate your work,
Cheers Sep 24, 2014 #12 salmanar...@gmail.com how to run the script file?
and how to get that multiplication sign in command
Being translated, please wait..
