Wireless Attackswifi802.11deauthenticationbeaconfloodingdosids-evasionmesh

mdk4

mdk4 is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. It supports various Wi-Fi attack modes including beacon flooding, deauthentication, and IDS evasion techniques.

Description

mdk4 is a Wi-Fi testing tool designed to demonstrate vulnerabilities in IEEE 802.11 protocol implementations. Developed as a successor to mdk3 by E7mer of 360PegasusTeam and ASPj of k2wrlz, it leverages the osdep library from aircrack-ng for frame injection across multiple operating systems. The tool includes 10 attack modules targeting different aspects of wireless networks, from beacon flooding to mesh network attacks.

Use cases include testing Wi-Fi network resilience against common attacks like deauthentication floods that disconnect clients from access points, authentication DoS that overwhelms APs with fake clients, and Michael Countermeasures exploitation specific to TKIP-encrypted networks. It also supports advanced IDS evasion through ghosting (rate/power switching) and fragmenting techniques. Additionally, features like SSID probing/bruteforcing help verify AP visibility and hidden network detection.

IMPORTANT: Users must obtain explicit permission from network owners before testing, as these attacks can crash scanners, reset APs, or disrupt legitimate traffic. The tool is licensed under GPLv3 or later.

How It Works

mdk4 injects crafted IEEE 802.11 frames using the osdep library from aircrack-ng, exploiting protocol weaknesses across 10 attack modes. Beacon Flooding sends fake AP beacons to overwhelm clients and scanners. Deauthentication/Disassociation modes target data traffic to disconnect stations from APs. Authentication DoS floods APs with auth frames. Michael Countermeasures sends QoS queue manipulation packets to trigger TKIP AP shutdowns. EAPOL injection creates fake sessions or logoffs. Mesh attacks manipulate 802.11s link management and routing. IDS evasion via --ghost (dynamic rate/power switching) and --frag (packet fragmentation) modifies outgoing packets. Packet Fuzzer applies modifiers to multiple packet sources. Mode 'x' tests protocol implementation vulnerabilities potentially causing disconnects or crashes.

Installation

bash
sudo apt install mdk4

Flags

--ghost <period>,<max_rate>,<min_txpower>Enable IDS evasion ghosting: switch rate/power every <period> ms, up to <max_rate> MBit, minimum <min_txpower> dBm
--frag <min_frags>,<max_frags>,<percent>Enable IDS evasion fragmenting: split packets into <min_frags> to <max_frags> fragments for <percent> of packets
--fullhelpDisplay all attack options
--help <attack_mode>Show information about a specific attack mode

Examples

Display help and list all 10 supported attack modes
mdk4 -h
Beacon Flooding: Send beacon frames creating fake APs to crash network scanners and drivers
mdk4 <interface> b
Authentication Denial-Of-Service: Flood APs with authentication frames to freeze or reset them
mdk4 <interface> a
Deauthentication and Disassociation: Disconnect clients from AP by targeting data traffic
mdk4 <interface> d
SSID Probing and Bruteforcing: Probe APs for visibility and bruteforce hidden SSIDs
mdk4 <interface> p
Michael Countermeasures: Trigger TKIP AP shutdown by exploiting QoS queues
mdk4 <interface> m
EAPOL Start/Logoff Injection: Flood AP with fake sessions or logoff clients
mdk4 <interface> e
WiFi protocol vulnerability testing: Test device for implementation flaws causing disconnects or crashes
mdk4 <interface> x
Updated 2026-04-16kali.org ↗