In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
How to use MDK3 for Wi-Fi interference, I believe that many inexperienced people do not know what to do. Therefore, this paper summarizes the causes and solutions of the problem. Through this article, I hope you can solve this problem.
These attacks can be done using Kali Linux and wireless network cards.
Step 1: install MDK3
Kali includes MDK3 by default, but if you do not have MDK3 installed, you can install it by typing the following.
We can type mdk3-- help d to get help specific to the unauthentication module. Here we can see that it is different from Aireplay-ng 's options. Instead, we have the following options to attack.
Looking at these options, we need at least one piece of target information to start blocking its network.
To do this, we can type ifconfig in the terminal window to find the name of the network adapter. It should be similar to "wlan0" or "wlan1".
Once you have the device name, you can put it in monitor mode using the following airmon-ng command, where wlan0 is the name of the network card.
When this is done, type ifconfig again to get a new name for the device. It is similar to "wlan0mon".
Once you have this information, you can run some scripts to cancel networking requests for all nearby devices. This is noisy, not as effective as target interference, and may require a network card to continue to work. In my tests, one Nic attack on all nearby devices caused almost no significant disruption, while three Nic attacks on all nearby devices caused annoying network disconnections.
To perform the attack, type the following in the terminal window and use wlan0mon as the name of the adapter in monitoring mode.
Now all nearby wifi networks are disconnected to a certain extent.
It is better to jump to the channel because this attack is better, otherwise it may not be very fast. This is also very destructive because it can disconnect anything within the scope.
We can use another tool called Airodump-ng to find the channel where the target is located.
Type the following command to view information about all nearby wireless networks.
Once you know the channel where AP is located, you can press Ctrl-C to cancel the scan, and then type the following in the terminal window. The channel we want to attack is channel 6.
The interference channel is very effective, but it can affect the connected wifi devices on that channel. Now we need to further improve it and put the equipment on the whitelist and blacklist.
Type the command line
All devices listed that are associated with the MAC address that matches the destination network channel.
Once the associated MAC address is found, we can easily locate it. Copy the MAC address and open a new terminal window. Type nano black.txt, then press Enter to open the text editor window. Now, paste the MAC address of the device you want to plug, and then press Ctrl-X to close the text editor.
Now, we can run MDK3 against the target network by running the following command
Running this command will block the device you indicate very quickly and continuously. How also do not connect to the Internet, especially hate people, hehe.
Tip: this is all written to understand the technology, do not use it improperly
After reading the above, have you mastered how to use MDK3 for Wi-Fi interference? If you want to learn more skills or want to know more about it, you are welcome to follow the industry information channel, thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.