安全工具Aircrack-ng的使用

开启了尘封数月的Kali Linux。

其实安全也是数据库学习方向的一个分支哦~~

官方网站:http://aircrack-ng.org

root@kali:~# airbase-ng --help
Airbase-ng 1.2 beta3 - (C) 2008-2013 Thomas d'Otreppe
        Original work: Martin Beck
        http://www.aircrack-ng.org

        usage: airbase-ng <options> <replay interface>

        Options:

        -a bssid         : set Access Point MAC address
        -i iface         : capture packets from this interface
-w WEP key       : use this WEP key to en-/decrypt packets
        -h MAC           : source mac for MITM mode
        -f disallow      : disallow specified client MACs (default: allow)
        -W 0|1           : [don't] set WEP flag in beacons 0|1 (default: auto)
        -q               : quiet (do not print statistics)
        -v               : verbose (print more messages)
        -A               : Ad-Hoc Mode (allows other clients to peer)
        -Y in|out|both   : external packet processing
        -c channel       : sets the channel the AP is running on
        -X               : hidden ESSID
        -s               : force shared key authentication (default: auto)
        -S               : set shared key challenge length (default: 128)
        -L               : Caffe-Latte WEP attack (use if driver can't send frags)
        -N               : cfrag WEP attack (recommended)
        -x nbpps         : number of packets per second (default: 100)
        -y               : disables responses to broadcast probes
        -0               : set all WPA,WEP,open tags. can't be used with -z & -Z
        -z type          : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104
        -Z type          : same as -z, but for WPA2
        -V type          : fake EAPOL 1=MD5 2=SHA1 3=auto
        -F prefix        : write all sent and received frames into pcap file
        -P               : respond to all probes, even when specifying ESSIDs
        -I interval      : sets the beacon interval value in ms
        -C seconds       : enables beaconing of probed ESSID values (requires -P)

        Filter options:
        --bssid MAC      : BSSID to filter/use
        --bssids file    : read a list of BSSIDs out of that file
        --client MAC     : MAC of client to filter
        --clients file   : read a list of MACs out of that file
        --essid ESSID    : specify a single ESSID (default: default)
        --essids file    : read a list of ESSIDs out of that file

        --help           : Displays this usage screen

Aircrack-NG – 无线网络密码破解

root@kali:~# aircrack-ng --help
Aircrack-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
        http://www.aircrack-ng.org

        usage: aircrack-ng [options] <.cap / .ivs file(s)>

        Common options:

        -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
        -e <essid> : target selection: network identifier
        -b <bssid> : target selection: access point's MAC
        -p <nbcpu> : # of CPU to use  (default: all CPUs)
        -q         : enable quiet mode (no status output)
        -C <macs>  : merge the given APs to a virtual one
        -l <file>  : write key to file

        Static WEP cracking options:

        -c         : search alpha-numeric characters only
        -t         : search binary coded decimal chr only
        -h         : search the numeric key for Fritz!BOX
        -d <mask>  : use masking of the key (A1:XX:CF:YY)
        -m <maddr> : MAC address to filter usable packets
        -n <nbits> : WEP key length :  64/128/152/256/512
        -i <index> : WEP key index (1 to 4), default: any
        -f <fudge> : bruteforce fudge factor,  default: 2
        -k <korek> : disable one attack method  (1 to 17)
        -x or -x0  : disable bruteforce for last keybytes
        -x1        : last keybyte bruteforcing  (default)
        -x2        : enable last  2 keybytes bruteforcing
        -X         : disable  bruteforce   multithreading
        -y         : experimental  single bruteforce mode
        -K         : use only old KoreK attacks (pre-PTW)
        -s         : show the key in ASCII while cracking
        -M <num>   : specify maximum number of IVs to use
        -D         : WEP decloak, skips broken keystreams
        -P <num>   : PTW debug:  1: disable Klein, 2: PTW
        -1         : run only 1 try to crack key with PTW

        WEP and WPA-PSK cracking options:

        -w <words> : path to wordlist(s) filename(s)

        WPA-PSK options:

        -E <file>  : create EWSA Project file v3
        -J <file>  : create Hashcat Capture file
        -S         : WPA cracking speed test

        Other options:

        -u         : Displays # of CPUs & MMX/SSE support
        --help     : Displays this usage screen

airdecap-NG – 解密WEP / WPA / WPA2捕获文件

root@kali:~# airdecap-ng --help

        Airdecap-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
        http://www.aircrack-ng.org

        usage: airdecap-ng [options] <pcap file>

Common options:
        -l         : don't remove the 802.11 header
        -b <bssid> : access point MAC address filter
        -e <essid> : target network SSID

        WEP specific option:
        -w <key>   : target network WEP key in hex

        WPA specific options:
        -p <pass>  : target network WPA passphrase
        -k <pmk>   : WPA Pairwise Master Key in hex

        --help     : Displays this usage screen

airdecloak-NG – 从PCAP文件删除WEP保护

root@kali:~# airdecloak-ng --help

        Airdecloak-ng 1.2 beta3 - (C) 2008-2013 Thomas d'Otreppe
        http://www.aircrack-ng.org

        usage: airdecloak-ng [options]

        options:

        Mandatory:
        -i <file>             : Input capture file
        --ssid <ESSID>        : ESSID of the network to filter
        or
        --bssid <BSSID>       : BSSID of the network to filter

        Optional:
        --filters <filters>   : Apply filters (separated by a comma). Filters:
        signal:               Try to filter based on signal.
        duplicate_sn:         Remove all duplicate sequence numbers
        for both the AP and the client.
        duplicate_sn_ap:      Remove duplicate sequence number for
        the AP only.
        duplicate_sn_client:  Remove duplicate sequence number for the
        client only.
        consecutive_sn:       Filter based on the fact that IV should
        be consecutive (only for AP).
        duplicate_iv:         Remove all duplicate IV.
        signal_dup_consec_sn: Use signal (if available), duplicate and
        consecutive sequence number (filtering is
        much more precise than using all these
        filters one by one).
        --null-packets        : Assume that null packets can be cloaked.
        --disable-base_filter : Do not apply base filter.
        --drop-frag           : Drop fragmented packets

        --help                : Displays this usage screen

airdriver-NG – 提供有关系统上的无线驱动程序的状态信息

root@kali:~# airdriver-ng --help
        Found kernel: 3.3.12-kali1-686-pae.3.12-kali1-686-pae
        usage: airdriver-ng <command> [drivernumber]
        valid commands:
        supported       - lists all supported drivers
        kernel          - lists all in-kernel drivers
        installed       - lists all installed drivers
        loaded          - lists all loaded drivers
        -----------------------------------------------------
        insert <drivernum>  - inserts a driver
        load <drivernum>    - loads a driver
        unload <drivernum>  - unloads a driver
        reload <drivernum>  - reloads a driver
        -----------------------------------------------------
        compile <drivernum> - compiles a driver
        install <drivernum> - installs a driver
        remove <drivernum>  - removes a driver
        -----------------------------------------------------
        compile_stack <stacknum>    - compiles a stack
        install_stack <stacknum>    - installs a stack
        remove_stack <stacknum> - removes a stack
        -----------------------------------------------------
        install_firmware <drivernum>    - installs the firmware
        remove_firmware <drivernum> - removes the firmware
        -----------------------------------------------------
        details <drivernum> - prints driver details
        detect          - detects wireless cards

airodump中-NG – 用于原始802.11帧的数据包捕获

oot@kali:~# airodump-ng --help

        Airodump-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
        http://www.aircrack-ng.org

        usage: airodump-ng <options> <interface>[,<interface>,...]

        Options:
        --ivs                 : Save only captured IVs
        --gpsd                : Use GPSd
        --write      <prefix> : Dump file prefix
        -w                    : same as --write
        --beacons             : Record all beacons in dump file
        --update       <secs> : Display update delay in seconds
        --showack             : Prints ack/cts/rts statistics
        -h                    : Hides known stations for --showack
        -f            <msecs> : Time in ms between hopping channels
        --berlin       <secs> : Time before removing the AP/client
        from the screen when no more packets
        are received (Default: 120 seconds)
        -r             <file> : Read packets from that file
        -x            <msecs> : Active Scanning Simulation
        --manufacturer        : Display manufacturer from IEEE OUI list
        --uptime              : Display AP Uptime from Beacon Timestamp
        --output-format
<formats> : Output format. Possible values:
        pcap, ivs, csv, gps, kismet, netxml
        --ignore-negative-one : Removes the message that says
        fixed channel <interface>: -1

        Filter options:
        --encrypt   <suite>   : Filter APs by cipher suite
        --netmask <netmask>   : Filter APs by mask
        --bssid     <bssid>   : Filter APs by BSSID
        --essid     <essid>   : Filter APs by ESSID
        -a                    : Filter unassociated clients

        By default, airodump-ng hop on 2.4GHz channels.
        You can make it capture on other/specific channel(s) by using:
        --channel <channels>  : Capture on specific channels
        --band <abg>          : Band on which airodump-ng should hop
        -C    <frequencies>   : Uses these frequencies in MHz to hop
        --cswitch  <method>   : Set channel switching method
        0       : FIFO (default)
        1       : Round Robin
        2       : Hop on last
        -s                    : same as --cswitch

        --help                : Displays this usage screen

airserv-NG – 无线网卡服务器

root@kali:~# airserv-ng --help
        airserv-ng: invalid option -- '-'

        Airserv-ng 1.2 beta3 - (C) 2007, 2008, 2009 Andrea Bittau
        http://www.aircrack-ng.org

        Usage: airserv-ng <options>

Options:

        -h         : This help screen
        -p  <port> : TCP port to listen on (default:666)
        -d <iface> : Wifi interface to use
-c  <chan> : Channel to use
        -v <level> : Debug level (1 to 3; default: 1)

airtun-NG – 虚拟通道接口的创造者

root@kali:~# airtun-ng --help

        Airtun-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
        Original work: Martin Beck
        http://www.aircrack-ng.org

        usage: airtun-ng <options> <replay interface>

        -x nbpps         : number of packets per second (default: 100)
        -a bssid         : set Access Point MAC address
        : In WDS Mode this sets the Receiver
        -i iface         : capture packets from this interface
-y file          : read PRGA from this file
        -w wepkey        : use this WEP-KEY to encrypt packets
        -t tods          : send frames to AP (1) or to client (0)
        : or tunnel them into a WDS/Bridge (2)
        -r file          : read frames out of pcap file

        WDS/Bridge Mode options:
        -s transmitter   : set Transmitter MAC address for WDS Mode
        -b               : bidirectional mode. This enables communication
        : in Transmitter's AND Receiver's networks.
        : Works only if you can see both stations.

        Repeater options:
        --repeat         : activates repeat mode
        --bssid <mac>    : BSSID to repeat
        --netmask <mask> : netmask for BSSID filter

        --help           : Displays this usage screen

besside-NG – 自动破解WEP和WPA网络

root@kali:~# besside-ng --help
        besside-ng: invalid option -- '-'

        Besside-ng 1.2 beta3 - (C) 2010 Andrea Bittau
        http://www.aircrack-ng.org

        Usage: besside-ng [options] <interface>

        Options:

        -b <victim mac> : Victim BSSID
        -s <WPA server> : Upload wpa.cap for cracking
        -c       <chan> : chanlock
        -p       <pps>  : flood rate
        -W              : WPA only
        -v              : verbose, -vv for more, etc.
        -h              : This help screen

原文发布于微信公众号 - 数据库SQL(SQLdba)

原文发表时间:2018-02-02

本文参与腾讯云自媒体分享计划,欢迎正在阅读的你也加入,一起分享。

发表于

我来说两句

0 条评论
登录 后参与评论

相关文章

来自专栏Java与Android技术栈

用kotlin来实现dsl风格的编程

Anko 是一个 DSL (Domain-Specific Language), 它是JetBrains出品的,用 Kotlin 开发的安卓框架。它主要的目的是...

612
来自专栏一个会写诗的程序员的博客

13.12 Spring Boot集成Security中遇到的问题13.12 Spring Boot集成Security中遇到的问题问题1:Spring Boot集成Security使用数据库用户角色

sql语法手误。1?这地方写错了,应该是?1。这在敲代码的时候,手速一旦稍有不慎,就会导致前后顺序颠倒,而导致输入错误。这个虽然说是“低级错误”,但是错误搞起来...

722
来自专栏祝威廉

PySpark如何设置worker的python命令

因为最近在研究spark-deep-learning项目,所以重点补习了下之前PySpark相关的知识,跟着源码走了一遍。希望能够对本文的读者有所帮助。

612
来自专栏CreateAMind

手把手教强化学习1: Q-learning 十步实现猫捉耗子视频及代码

571
来自专栏张善友的专栏

通过SmtpClient发送Exchange会议邮件

看到C#中调用Outlook API 发起会议 ,这个完全可以用SMTP方式实现的,下面我的项目中使用的代码: 对于.NET而言,从2.0开始,发邮件已经是一件...

1859
来自专栏Golang语言社区

Golang生产级可靠UDP库

kcp-go is a Production-Grade Reliable-UDP library for golang.

812
来自专栏岑志军的专栏

ReactNative-ListView

1713
来自专栏Android开发经验

Volley从源码梳理主要工作流程简记

重点来了。 这里开启了一个缓存调度线程CacheDispatcher,一个网络请求调度线程NetworkDispatcher。

392
来自专栏字根中文校对软件

Java 错别字检查接口 API

Java 错别字检查接口 API 为了方便广大程序员朋友快速把错别字检查功能集成到自己的系统中,我们开发了一个支持HTTP协议的 Java 错别字检查接口 AP...

3435
来自专栏XAI

企业支付宝账号开发接口教程--JAVA-UTF-8(实际操作------SpringMVC+JSP)

关于即时到账的开发。审核通过。简单测试如下。 希望看的可以收藏或者赞一下哦。 1:拥有自己的支付宝企业账号。去产品商店选择适合自己的方案。并签约合同。 ? 2:...

7459

扫码关注云+社区