Results 1 to 50 of 55

Thread: Force an AP to reboot

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    2013-Jul
    Location
    United States
    Posts
    520

    Force an AP to reboot

    *This thread is under construction*- Be responsible with whatever is cooked up in this thread. Nobody here is going to be responsible for any trouble you get into if you choose to be stupid with this stuff.

    Hello friends. Chef soxrok2212 is in the kitchen again, looking to cook up a new way to force an AP to reboot remotely. Over the course of the past few months, following all the Pixie Dust developments, I figured finding a new way to remotely reboot APs would be a huge improvement over the depreciated MDK3, as it is not very effective on newer hardware. Here are some of the proposed ideas (from myself and a few other members).

    1- Invalid SSID Character Attack
    -Thanks to a Musket Developer, the community now has a modified version of MDK3! This version features a new test mode "t" where it sends a user specified amount of invalid probe requests to an AP.

    -The hope here is that the AP will get confused and use those "Self Healing" features and just do a reboot. I have tested briefly on some newer hardware, and while I wasn't able to completely crash anything, it pretty much killed everything. On older hardware, I suspect that this will work.

    -You can download mdk3-master here
    Install Instructions
    Code:
    cd /mdk3-master
    make
    sudo make install
    Usage
    Code:
    t   - Probe Request Tests (mod-musket)
      mdk3 <mon> t <channel> <bssid AP> <frames/sec>
    -All other stranded MDK3 options are included as well

    -Please leave a comment if you are successful!

    *Strangely enough, after I had suggested this idea a few weeks ago, a new flaw was found in P2P devices which does essentially what I was thinking of (though it is used for a different application)*

    2- WPS M2 Exploit
    -Datahead has been testing this new method, where we basically send a bunch of M2 messages (yes, the M2 messages in a WPS exchange.)

    -What needs to be done, is we need to associate with the AP, (either through Reaver or aireplay-ng, etc) and then generate and flood M2 packets that can even be made with random data.

    3- QOS-TKIP Inject
    -There has been a lot of stir over semi-recent WPA-TKIP attacks, specifically the Beck-Tews, or the newer Ohigashi-Morii attack. Basically, we are able to recover the MIC key and some other small components which allows up to inject arbitrary data into a network supporting TKIP, and I'm wondering if we can trigger the network to reset with that data. It seems promising since simply trying 2 invalid MIC keys within 60 seconds locks all wireless traffic on the AP for 60? seconds, so maybe we can incorporate something new. I'm not 100% familiar with the attack in details, but I'm looking into it.

    4- The Infamous MDK3 Secret Destruction Mode Attack
    -This method has been depreciated since most newer hardware is invulnerable. Check it out here
    Last edited by soxrok2212; 2015-05-23 at 13:00. Reason: New MDK3

Similar Threads

  1. re-enabling force encryption
    By anaschauhan33 in forum NetHunter General Questions
    Replies: 2
    Last Post: 2021-05-14, 02:47
  2. Replies: 3
    Last Post: 2020-01-14, 14:57
  3. Force an AP to reboot
    By soxrok2212 in forum Project Archive
    Replies: 40
    Last Post: 2015-09-07, 05:33
  4. Brute Force vs. Dictionary
    By Kalinoob in forum General Archive
    Replies: 6
    Last Post: 2014-01-05, 15:45

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •