I was inspired to do this project while wondering what people who don't do programming think hackers do, while also listening to il veno d'oro and scrolling through null byte

What it does

After performing reconnaissance and finding the desired target network BSSID the script will put the machines external WiFi card into monitor mode, then will send 1000 deauth packets unauthorizing clients from the network involuntarily. It will then sleep for 60 seconds where in that time it will do nothing and give clients enough time to reconnect and authorize, before kicking back into gear and repeating the process 1000 more times. In total of a million deauth packets when the script is fully ran. Death by a thousand deauths

How we built it

I wrote it using Vim in a kali linux environment utilizing airodump-ng, and creating a new interface for monitoring networks.

What the different parts of code do

(there's supposed to be a hashtag in front of the exclamation mark)!/bin/bash - Tells the terminal what interpreter you use iface= - Tells your system what wireless adapter to use AP= - Targets MAC Address iw $iface interface add requiem0 type monitor - will create a monitor mode on wlan1, and assign it to requiem0 ifconfig requiem0 up - Brings up the requiem0 IF function control_c() - This function handles the stopping action, once you press the ctrl-c your script will not only just stop, but also delete the monitor mode. for i in {1..1000}- Creates a loop that will execute the commands a thousand times aireplay-ng –deauth 1000 - Sends deauth frames a thousand times to victim, death by 1000 slashes sleep 60s - tells the script to stop and do nothing for 60 seconds this way the victims will be able to re-authenticate for 60 seconds and then we kick them off again, imagine how annoying that'll be >:)

Challenges we ran into

The first was finding a legal network to test the script on since the act of unauthorized network attacks are illegal and carry a hefty fine. A major one was writing the script, since I'm used to working in a command line and structuring what I want done bit by bit, but working to make a program forced me to expand what I already knew and change it instead of switching projects. Other than that the process of trial, error, and google, and being solo was the only other issues

Accomplishments that we're proud of

Learning a new way I can apply my skills in kali to make new executables like this one. Making this project actually work and not get any issues with the attack. Which happily I got it to work.

What we learned

I learned how to write script into a executable file for later immediate use instead of repeating the same 23 or so lines of commands every time I want to utilize my tools, which cuts down time to begin the attack, the simplicity since too many moving parts are likely to fail, and the extra commands I have to remember for every tool.

What's next for Speed Dos

I hopefully want to integrate a evil twin network during the dos to capture passwords, or some other similar type of wifi attack. But who knows, SpeedDOS goes where the world needs him. The hero they didn't want and the hero they don't need.

Share this project: