当前位置:网站首页>Airtrack cracking wireless network password (Dictionary running method)
Airtrack cracking wireless network password (Dictionary running method)
2022-04-23 02:45:00 【Mechanical bucket running】
This tutorial is an exercise , Do not commit any illegal or criminal acts .
What is? Aircrack-ng
Aircrack-ng It is used to crack Wireless 802.11WEP And WPA-PSK Encryption tools , The tool is in 2005 year 11 Months ago, the name was Aircrack, In its 2.41 It was renamed after the version Aircrack-ng.
Aircrack-ng Two main attack methods are used to wap Crack : One is FMS attack , The way to attack is to discover the WEP The name of the vulnerability researcher (Scott Fluhrer、Itsik Mantin And Adi Shamir) Named ; The other is KoreK attack , Statistics , The attack efficiency of this attack method is much higher than FMS attack . Of course , The latest version integrates more types of attacks . For wireless hackers ,Aircrack-ng It is an indispensable wireless attack tool , It can be said that a large part of wireless attacks rely on it to complete ; For wireless security personnel ,Aircrack-ng It is also a necessary wireless security detection tool , It can help administrators check the vulnerability of wireless network passwords and understand the distribution of wireless network signals , It is very suitable for wireless security audit of enterprises .
◆ Use Aircrack-ng Crack WEP Encrypted wireless network
First of all, let's talk about how to crack WEP Encrypted content , Wireless networks that enable this type of encryption are often listed as one of the most insecure network environments . and Aircrack-ng It is the first choice of powerful weapons to crack such encryption , About use Aircrack-ng Suit cracking WEP The specific steps of encryption are as follows .
step 1: Load wireless network card .
In fact, many newcomers always have some doubts when they start loading network cards , So let's take a closer look at this basic operation . First, check which network cards have been loaded , Enter the command as follows :
Make sure you have inserted it correctly USB perhaps PCMCIA Wireless network card
ifconfig
step 2: Activate the wireless network card to monitor Monitoring mode .
For many little black , We should have used all kinds of sniffing tools to grab data packets such as passwords . that , You know that , The network card used for sniffing must be in monitor Listening mode . The same is true for sniffing wireless networks .
stay Linux Next , We use Aircrack-ng In the suit airmon-ng Tools to implement , The specific command is as follows :
In the picture sudo Yes, it is root Permissions to perform
airmon-ng start wlan0
Input steps 3: Detect wireless networks , Grab wireless packets .
After activating the wireless network card , We can start the wireless packet capture tool , Here we use Aircrack-ng In the suit airmon-ng Tools to implement , The specific command is as follows :
Use ifconfig Check the name of the active network card
But before the official capture , Generally, pre detection is carried out first , To get an overview of the current wireless network , Include AP Of SSID、MAC Address 、 Work channel 、 Wireless client MAC And quantity, etc . Just open one Shell, Enter the specific command as follows :
airodump-ng wlan0mon
Current network conditions
chart 9
Now that we see the target of this test , That's it. SSID be known as TP-LINK Wireless router , Next, enter the following command :
Pay attention to writing in this format
airodump-ng wlan0mon -c 5 --bssid 18:F0:E4:0D:3A:F4 -w file9.cap
# Specify the channel 、AP—MAC 、 Save data package
Parameter interpretation :
–ivs The settings here are filtered by setting , No longer save all wireless data , But just save what can be used to crack IVS The data packet , This can effectively reduce the saved packet size ;
-c Here we set goals AP Working channel , Through the observation just now , The working channel of the wireless router we want to test is 6;
–bssid Channeled mac Address
-w Followed by the file name to save , here w Namely “write Write ” It means , So enter the file name you want to keep , Here's the picture 10 I'll write here as longas. that , What little black people must pay attention to is : Here, although we set the saved file name to longas, But the generated file is not longase.ivs, It is longas-01.ivs.
This page is about to grab the handshake package
Here, in order to get what you need to crack WPA2 Handshake verification of the entire complete packet , We will send a message called “Deauth” To forcibly disconnect the legal wireless client connected to the wireless router , here , The client will automatically reconnect to the wireless router , We also have the opportunity to capture WPA2 Handshake verification of the complete packet .
Because it must be disconnected, the handshake bag will be generated in practice
STATION It's the client on our mobile phone mac Address We need to disconnect him
There is a problem with the following code , I've tried all the online tutorials , Can't even execute , I still took another device , Just got the handshake bag .
aireplay-ng -0 0 -a 44:4B:7E:8A:45:FD -c A6:85:62:CD:84:A3 wlan0mon
// This format
-0 use deauth Attack mode , Keep up with the number of attacks , Here I set it to 1, You can set it to... According to the actual situation 10 Unequal
-a Followed by the router mac Address
-c Followed by the client mac Address
aireplay-ng -3 -b AP Of mac -h Client's mac mon0
appear handshake It's a successful crack
Now start using your own dictionary Match the package .
aircrack-ng -w /root/wifi.txt /root/test-01.cap( To use absolute paths )
wifi.txt It's a blasting dictionary ,test-01.ivs It's the file of the grabbed package
Get the password perfectly !
summary
The above code that kicks out others cannot run .
I got the handshake package immediately after I connected it with another device
版权声明
本文为[Mechanical bucket running]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204220745203497.html
边栏推荐
- Android 高阶面试必问:全局业务和项目的架构设计与重构
- SQL server2019 cannot download the required files, which may indicate that the version of the installer is no longer supported. What should I do
- 全局、獨享、局部路由守衛
- Log cutting - build a remote log collection server
- 字符串去掉空格问题
- Windows MySQL 8 zip installation
- The 16th day of sprint to the big factory, noip popularization Group Three Kingdoms game
- Looking for a job, writing a resume to an interview, this set of information is enough!
- Hack the box optimum
- 程序设计天梯赛 L1-49 天梯赛分配座位(模拟),布响丸辣
猜你喜欢
Flink learning (XI) watermark
Interpretation of the future development of smart agriculture
期中汇总(概论+应用层+运输层)
LeetCode 1450 - 1453
php+mysql对下拉框搜索的内容修改
基于Scrum进行创新和管理
First knowledge of C language ~ branch statements
认识进程(多线程_初阶)
How big the program development of single chip microcomputer project can be, it represents your level of knocking code
SQL server2019 cannot download the required files, which may indicate that the version of the installer is no longer supported. What should I do
随机推荐
[suggestion collection] hematemesis sorting out golang interview dry goods 21 questions - hanging interviewer-1
Machine learning (Zhou Zhihua) Chapter 14 probability graph model
Probabilistic model of machine learning
Interim summary (Introduction + application layer + transportation layer)
高效音乐格式转换工具Music Converter Pro
Target narak
Source code and some understanding of employee management system based on polymorphism
Rhcsa day 1 operation
Global, exclusive and local routing guard
1、 Sequence model
[XJTU計算機網絡安全與管理]第二講 密碼技術
hack the box optimum靶机
【Hcip】OSPF常用的6种LSA详解
Deploying sbert model based on torchserve < semantic similarity task >
Push data from onenet cloud platform to database
[xjtu Computer Network Security and Management] session 2 Cryptographic Technology
Program design: l1-49 ladder race, allocation of seats (simulation), Buxiang pill hot
Win view port occupation command line
Rhcsa day 3 operation
Store consumption SMS notification template