首页
学习
活动
专区
工具
TVP
发布
精选内容/技术社群/优惠产品,尽在小程序
立即前往
  • 您找到你想要的搜索结果了吗?
    是的
    没有找到

    hostapd 配置「建议收藏」

    hostapd is an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator. This page is dedicated to the Linux documentation of it’s implementation and use. Please refer to the hostapd home page for information for other Operating Systems. As far a Linux is concerned, out of the old drivers you can only use these 3 drivers with hostapd: HostAP madwifi prism54 All new mac80211 based drivers that implement AP functionality are supported with hostapd’s nl80211 driver. The mac80211 subsystem moves all aspects of master mode into user space. It depends on hostapd to handle authenticating clients, setting encryption keys, establishing key rotation policy, and other aspects of the wireless infrastructure. Due to this, the old method of issuing ‘ iwconfig <wireless interface> mode master’ no longer works. Userspace programs like hostapd now use netlink (the nl80211 driver) to create a master mode interface for your traffic and a monitor mode interface for receiving and transmitting management frames. Getting hostapd Using your distributions hostapd It is advisable to try your distributions version of hostapd before taking the time to compile and install your own copy. This will make future maintenance easier as you’ll be able to use the init scripts shipped by the distro and hostapd will be updated by it as well. If your distribution ships 0.6.8 or later, you can test with this bare minimum config by creating the file hostapd-minimal.conf: #change wlan0 to your wireless device interface=wlan0 driver=nl80211 ssid=test channel=1 If that config errors out with something like: hostapd $ sudo hostapd ./hostapd-minimal.conf Configuration file: ./hostapd-minimal.conf Line 2: invalid/unknown driver ‘nl80211’ 1 errors found in configuration file ‘./hostapd-minimal.conf’ that means that your distro is not shipping hostapd with nl80211 driver support and you’ll need to follow the building instructions that follow. If it works, you can skip down to the configuring hostapd secti

    02

    渗透之——使用reaver傻瓜式破解wifi之利用路由器WPS漏洞

    跟这篇破解教程一样,网上破解教程多是基于路由器的WPS漏洞破解,但是这样的路由器只占少数。一般wifi是依据WPA/WPA2加密的,因此想要破解一般的wifi,还得破解这个协议,虽然近期这个协议也被破解了,不过也是很不容易的。 刚入门破解,不是很熟悉,在网上找各种破解资料,终于破解成功了临近工作室的wifi,沾沾自喜~ 本文破解wifi针对一些路由器的WPS(Wi-fi protected setup)漏洞,尝试很多次抓包PIN码,破解2-3天,正常来说是一定能抓到正确的PIN码的。 一个路由器对应唯一的MAC和PIN,而一旦得到MAC和PIN,通过reaver工具,路由密码等信息就可以很快得出来。 1.安装依赖包: sudo apt-get install -y libpcap-dev libsqlite3-dev sqlite3 libpcap0.8-dev libssl-dev build-essential iw tshark subversion 2.安装aircrack-ng: svn co http://svn.aircrack-ng.org/trunk/ aircrack-ng cd aircrack-ng/ make (aircrack-ng源码安装参考http://www.tuicool.com/articles/MfUjii) sudo make install 3.安装reaver: 在https://pan.baidu.com/s/1kUdvM1D下载reaver tar zxvf reaver-1.4.tar.gz cd reaver-1.4/src ./configure make sudo make install 4.如果安装成功后,会有airmon-ng,airodump-ng,reaver等命令可用(如果没有ethtool,要安装:apt-get install ethtool) 5.开始破解:(参考http://www.she.vc/article/18-108334-0.html http://www.kali.org.cn/thread-20995-1-1.html) (1)sudo airmon-ng check kill (关闭进程,部分进程可能影响到后续的操作)

    03
    领券