mdk4 icon indicating copy to clipboard operation
mdk4 copied to clipboard

Issuie Mdk4 not jamming

Open Barty89 opened this issue 5 years ago • 8 comments

Hi everyone I have a issuie not sure why it’s happening so posting here.

Running kali Linux 2019.1 in VMware’s My issuie is I can’t kick anyone off a AP with deauth I was using fluxion to track with one WiFi adapter and a second to jam my real AP but none of my devices get kicked off the AP I’ve used mdk3 and mdk4 no joy with aireplay too

Any advice is much appreciated And a fix is VERY VERY appreciated!

“Disconnecting * from * on channel 12

Packets sent: 671 - speed: 12 packets/sec”

Can post any other data required.

Barty89 avatar Mar 29 '19 12:03 Barty89

how would I know if my AP has 802.11w (encrypted management frames) as I opened up airodump and focused on my AP and when I try mdk4 attack it it is switching ch rapidly in the top left corner so the only thing I could think of is maybe my ap has 802.11w if it has does that mean anything I can’t attack it at all ?

Barty89 avatar Mar 29 '19 23:03 Barty89

You can open the capture with wireshark, locate a beacon, then open the 802.11 wireless wlan section, then the tagged parameters. In the RSN information tag, select RSN capabilities, 802.11w is "Management frame protection". There are 2 bits. It can be disabled ("capable"), optional or mandatory.

If the client has negotiated 802.11w, then you won't be able to kick him out.

aircrack-ng avatar Apr 02 '19 19:04 aircrack-ng

Thank you! Gonna try this tonight and report back

Barty89 avatar Apr 02 '19 20:04 Barty89

This is the first time I’ve used wireshark and think I actually found what you was talking about.

Management frame protection required: false

Management frame protection capable: false ?

I’ve take a pic of this are links to screenshots allowed ? Does this mean I can’t deauth from what I’ve posted ?

Barty89 avatar Apr 02 '19 22:04 Barty89

Found this helpful -

“Management Frame Protection Capable must have the value True. There is also a RSN IE element in the capture of beacons from an SSID send by an access point. If the Management Frame Protection Required is true in the capture of the beacon, only 802.11w-capable devices can connect to this network. If both values for Management Frame Protection Required and Management Frame Protection Capable are False, 802.11w is not enabled on the network. I use an IPad Air to test the connect behaviour when using a device not supporting 802.11w.

To test the 802.11w protection, I use the Aircrack-ng suite. More specific I use Airodump-ng to check if the 4-way handshake is captured and I use aireplay-ng to inject deauthentication packets (replay) to deauthenticate a client and enforce the client to execute the 4-way handshake with the access point (because we need those packets to crack the code). If 802.11w is working, the client will not deauthenticate and the 4-way handshake is not captured.”

Now what baffles me is my AP isn’t protected by 802.11w so not sure why it isn’t deauth any of my devices from my AP Back to square one... any ideas please

Barty89 avatar Apr 03 '19 02:04 Barty89

No offense but the second paragraph is BS. There are a number of reasons it can fail:

  • Bad driver: says it injected successfully but it didn't
  • Client is too far
  • Some clients will not deauth unless doing broadcast deauth

The only way to test 802.11w is to look at the beacon, period as I explained.

aircrack-ng avatar Apr 03 '19 02:04 aircrack-ng

I believe I found the beacon and it said

Management frame protection required: false

Management frame protection capable: false ?

So I’m assuming no 802.11w so I’m gonna try find drivers but drivers come installed for kali for my WiFi adapater as it’s a alfa

Any other ideas how I can fix ?

Barty89 avatar Apr 03 '19 10:04 Barty89

So til now there is no way of deauthenticate 802.11w connected clients?

zartaz avatar Oct 23 '19 15:10 zartaz