Results (
English) 1:
[Copy]Copied!
How to Reset WPS Lockouts Using MDK3 Use at your own risk! Section 638:17 of the New Hampshire House Bill 495 highlightsUnited States rules against wirelesshacking. Attempting to and or gainingaccess to a network that you do not own orhave permission to is STRICTLY forbidden. I am NOT responsible for ANYTHING you do with this information.The purpose of this guide is to inform usersabout how a router can be exploited totemporarily reset WPS lockouts. This can be useful when using reaver to crack a WPSpin. Keep in mind that this does not workwith every router. It largely depends onhardware. This attack uses MDK3, a set of tools by ASPj to overload the target AP with useless data, thus causing it to freeze andreset. Here is how it works. (Each of thesecommands are run in a separate terminalwindow) and I think you can figure out thevariables here.Code: [View] mdk3 monX @ -@ xx:xx:xx:xx:xx:xx -m This floods the target AP with fake clients. Code: [View] mdk3 monX m -t xx:xx:xx:xx:xx:xx This causes Michael failure, stopping allwireless traffic. However, this only works ifthe target AP supports TKIP. (Can be AES+TKIP) Code: [View] mdk3 monX d -b blacklist -c X This keeps a continuous deauth on thenetwork. If this attack does not start, makea blank text document in your root foldernamed blacklist. Leave it empty as MDK3automatically populates the list. Code: [View] mdk3 monX b -t xx:xx:xx:xx:xx:xx -c X This floods a bunch of fake APs to anyclients in range (only effective to windowsclients and maybe some other devices,Macs are protected against this). You will know when the AP has reset eitherby checking withCode: [View] wash -! monX -Cor if the target shows channel -1 and MBshows -1 in airodump.Please do NOT use this on a network that isnot yours or that you do not have permissionto. If the owner finds out that it is you who is attacking their network, you may end up inserious legal trouble.Visit ASPj's site as mentioned above formore information. Preventing the attack As of now, there is no way to prevent theattack except by disabling wireless, buying ahigh end router, or getting an AP thatencrypts management packets.Deauthentication packets are managementframes which are sent UNENCRYPTED unless you purchase an AP that supportsMFP. You can read more about this here. Downloads for useful programs: I will do my best to keep these updated
Being translated, please wait..