了Aircrack-ng的包装说明

了Aircrack-ng的是802.11 WEP和WPA-PSK密钥破解程序一旦足够的数据包已被抓获,可以恢复键。它实现了标准的FMS攻击和一些优化,像KoreK攻击,以及全新的PTW攻击,从而使攻击快得多相比其他WEP破解工具。 资料来源:http://aircrack-ng.org/

了Aircrack-ng的首页 | 卡利了Aircrack-ng的回购

  • 作者:托马斯·德Otreppe,原作:克里斯托夫迪瓦恩
  • 许可:GPL第二版

    0x01 列入了Aircrack-ng的封装工具

    空军基地-NG - 配置假冒接入点
    :~# airbase-ng --help
    Airbase-ng 1.2 beta3 - (C) 2008-2013 Thomas d'Otreppe
    Original work: Martin Beck
    http://www.aircrack-ng.org
    usage: airbase-ng <options> <replay interface>
    Options:
        -a bssid         : set Access Point MAC address
        -i iface         : capture packets from this interface
        -w WEP key       : use this WEP key to en-/decrypt packets
        -h MAC           : source mac for MITM mode
        -f disallow      : disallow specified client MACs (default: allow)
        -W 0|1           : [don't] set WEP flag in beacons 0|1 (default: auto)
        -q               : quiet (do not print statistics)
        -v               : verbose (print more messages)
        -A               : Ad-Hoc Mode (allows other clients to peer)
        -Y in|out|both   : external packet processing
        -c channel       : sets the channel the AP is running on
        -X               : hidden ESSID
        -s               : force shared key authentication (default: auto)
        -S               : set shared key challenge length (default: 128)
        -L               : Caffe-Latte WEP attack (use if driver can't send frags)
        -N               : cfrag WEP attack (recommended)
        -x nbpps         : number of packets per second (default: 100)
        -y               : disables responses to broadcast probes
        -0               : set all WPA,WEP,open tags. can't be used with -z & -Z
        -z type          : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104
        -Z type          : same as -z, but for WPA2
        -V type          : fake EAPOL 1=MD5 2=SHA1 3=auto
        -F prefix        : write all sent and received frames into pcap file
        -P               : respond to all probes, even when specifying ESSIDs
        -I interval      : sets the beacon interval value in ms
        -C seconds       : enables beaconing of probed ESSID values (requires -P)
    Filter options:
        --bssid MAC      : BSSID to filter/use
        --bssids file    : read a list of BSSIDs out of that file
        --client MAC     : MAC of client to filter
        --clients file   : read a list of MACs out of that file
        --essid ESSID    : specify a single ESSID (default: default)
        --essids file    : read a list of ESSIDs out of that file
        --help           : Displays this usage screen
    

    0x02 了Aircrack-NG - 无线网络密码破解

    :~# aircrack-ng --help
    Aircrack-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: aircrack-ng [options] <.cap / .ivs file(s)>
    Common options:
        -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
        -e <essid> : target selection: network identifier
        -b <bssid> : target selection: access point's MAC
        -p <nbcpu> : # of CPU to use  (default: all CPUs)
        -q         : enable quiet mode (no status output)
        -C <macs>  : merge the given APs to a virtual one
        -l <file>  : write key to file
    Static WEP cracking options:
        -c         : search alpha-numeric characters only
        -t         : search binary coded decimal chr only
        -h         : search the numeric key for Fritz!BOX
        -d <mask>  : use masking of the key (A1:XX:CF:YY)
        -m <maddr> : MAC address to filter usable packets
        -n <nbits> : WEP key length :  64/128/152/256/512
        -i <index> : WEP key index (1 to 4), default: any
        -f <fudge> : bruteforce fudge factor,  default: 2
        -k <korek> : disable one attack method  (1 to 17)
        -x or -x0  : disable bruteforce for last keybytes
        -x1        : last keybyte bruteforcing  (default)
        -x2        : enable last  2 keybytes bruteforcing
        -X         : disable  bruteforce   multithreading
        -y         : experimental  single bruteforce mode
        -K         : use only old KoreK attacks (pre-PTW)
        -s         : show the key in ASCII while cracking
        -M <num>   : specify maximum number of IVs to use
        -D         : WEP decloak, skips broken keystreams
        -P <num>   : PTW debug:  1: disable Klein, 2: PTW
        -1         : run only 1 try to crack key with PTW
    WEP and WPA-PSK cracking options:
        -w <words> : path to wordlist(s) filename(s)
    WPA-PSK options:
        -E <file>  : create EWSA Project file v3
        -J <file>  : create Hashcat Capture file
        -S         : WPA cracking speed test
    Other options:
        -u         : Displays # of CPUs & MMX/SSE support
        --help     : Displays this usage screen
    

    0x03 airdecap-NG - 解密WEP / WPA / WPA2捕获文件

    :~# airdecap-ng --help
    Airdecap-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: airdecap-ng [options] <pcap file>
    Common options:
        -l         : don't remove the 802.11 header
        -b <bssid> : access point MAC address filter
        -e <essid> : target network SSID
    WEP specific option:
        -w <key>   : target network WEP key in hex
    WPA specific options:
        -p <pass>  : target network WPA passphrase
        -k <pmk>   : WPA Pairwise Master Key in hex
        --help     : Displays this usage screen
    

    0x04 airdecloak-NG - 从PCAP文件删除WEP保护

    :~# airdecloak-ng --help
    Airdecloak-ng 1.2 beta3 - (C) 2008-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: airdecloak-ng [options]
    options:
     Mandatory:
       -i <file>             : Input capture file
       --ssid <ESSID>        : ESSID of the network to filter
          or
       --bssid <BSSID>       : BSSID of the network to filter
     Optional:
       --filters <filters>   : Apply filters (separated by a comma). Filters:
             signal:               Try to filter based on signal.
             duplicate_sn:         Remove all duplicate sequence numbers
                                   for both the AP and the client.
             duplicate_sn_ap:      Remove duplicate sequence number for
                                   the AP only.
             duplicate_sn_client:  Remove duplicate sequence number for the
                                   client only.
             consecutive_sn:       Filter based on the fact that IV should
                                   be consecutive (only for AP).
             duplicate_iv:         Remove all duplicate IV.
             signal_dup_consec_sn: Use signal (if available), duplicate and
                                   consecutive sequence number (filtering is
                                    much more precise than using all these
                                    filters one by one).
       --null-packets        : Assume that null packets can be cloaked.
       --disable-base_filter : Do not apply base filter.
       --drop-frag           : Drop fragmented packets
       --help                : Displays this usage screen
    

    0x05 airdriver-NG - 提供有关系统上的无线驱动程序的状态信息

    :~# airdriver-ng --help
    Found kernel: 3.3.12-kali1-686-pae.3.12-kali1-686-pae
    usage: airdriver-ng <command> [drivernumber]
      valid commands:
          supported       - lists all supported drivers
          kernel          - lists all in-kernel drivers
          installed       - lists all installed drivers
          loaded          - lists all loaded drivers
          -----------------------------------------------------
          insert <drivernum>  - inserts a driver
          load <drivernum>    - loads a driver
          unload <drivernum>  - unloads a driver
          reload <drivernum>  - reloads a driver
          -----------------------------------------------------
          compile <drivernum> - compiles a driver
          install <drivernum> - installs a driver
          remove <drivernum>  - removes a driver
          -----------------------------------------------------
          compile_stack <stacknum>    - compiles a stack
          install_stack <stacknum>    - installs a stack
          remove_stack <stacknum> - removes a stack
          -----------------------------------------------------
          install_firmware <drivernum>    - installs the firmware
          remove_firmware <drivernum> - removes the firmware
          -----------------------------------------------------
          details <drivernum> - prints driver details
          detect          - detects wireless cards
    

    0x06 aireplay-NG - 主要功能是产生流量在了Aircrack-ng的后期使用

    0x07 airmon-纳克 - 该脚本可用于启用无线接口监控模式

    :~# airmon-ng --help
    usage: airmon-ng <start|stop|check> <interface> [channel or frequency]
    

    0x08 airmon-ZC - 该脚本可用于启用无线接口监控模式

    :~# airmon-zc --help
    usage: airmon-zc <start|stop|check> <interface> [channel or frequency]
    

    0x09 airodump中-NG - 用于原始802.11帧的数据包捕获

    :~# airodump-ng --help
    Airodump-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: airodump-ng <options> <interface>[,<interface>,...]
    Options:
        --ivs                 : Save only captured IVs
        --gpsd                : Use GPSd
        --write      <prefix> : Dump file prefix
        -w                    : same as --write
        --beacons             : Record all beacons in dump file
        --update       <secs> : Display update delay in seconds
        --showack             : Prints ack/cts/rts statistics
        -h                    : Hides known stations for --showack
        -f            <msecs> : Time in ms between hopping channels
        --berlin       <secs> : Time before removing the AP/client
                                from the screen when no more packets
                                are received (Default: 120 seconds)
        -r             <file> : Read packets from that file
        -x            <msecs> : Active Scanning Simulation
        --manufacturer        : Display manufacturer from IEEE OUI list
        --uptime              : Display AP Uptime from Beacon Timestamp
        --output-format
                    <formats> : Output format. Possible values:
                                pcap, ivs, csv, gps, kismet, netxml
        --ignore-negative-one : Removes the message that says
                                fixed channel <interface>: -1
    Filter options:
        --encrypt   <suite>   : Filter APs by cipher suite
        --netmask <netmask>   : Filter APs by mask
        --bssid     <bssid>   : Filter APs by BSSID
        --essid     <essid>   : Filter APs by ESSID
        -a                    : Filter unassociated clients
    By default, airodump-ng hop on 2.4GHz channels.
    You can make it capture on other/specific channel(s) by using:
        --channel <channels>  : Capture on specific channels
        --band <abg>          : Band on which airodump-ng should hop
        -C    <frequencies>   : Uses these frequencies in MHz to hop
        --cswitch  <method>   : Set channel switching method
                      0       : FIFO (default)
                      1       : Round Robin
                      2       : Hop on last
        -s                    : same as --cswitch
        --help                : Displays this usage screen
    

    0x10 airodump中-NG-OUI更新 - 下载并解析IEEE OUI列表

    airodump中-NG-OUI-更新下载并解析IEEE OUI列表。

    0x11 airolib-NG - 专为存储和管理ESSID和密码列表

    :~# airolib-ng --help
    Airolib-ng 1.2 beta3 - (C) 2007, 2008, 2009 ebfe
    http://www.aircrack-ng.org
    Usage: airolib-ng <database> <operation> [options]
    Operations:
         --stats        : Output information about the database.
         --sql <sql>    : Execute specified SQL statement.
         --clean [all]  : Clean the database from old junk. 'all' will also
                          reduce filesize if possible and run an integrity check.
         --batch        : Start batch-processing all combinations of ESSIDs
                          and passwords.
         --verify [all] : Verify a set of randomly chosen PMKs.
                          If 'all' is given, all invalid PMK will be deleted.
         --import [essid|passwd] <file>   :
                          Import a text file as a list of ESSIDs or passwords.
         --import cowpatty <file>         :
                          Import a cowpatty file.
         --export cowpatty <essid> <file> :
                          Export to a cowpatty file.
    

    0x12 airserv-NG - 无线网卡服务器

    :~# airserv-ng --help
    airserv-ng: invalid option -- '-'
    Airserv-ng 1.2 beta3 - (C) 2007, 2008, 2009 Andrea Bittau
    http://www.aircrack-ng.org
    Usage: airserv-ng <options>
    Options:
         -h         : This help screen
         -p  <port> : TCP port to listen on (default:666)
         -d <iface> : Wifi interface to use
         -c  <chan> : Channel to use
         -v <level> : Debug level (1 to 3; default: 1)
    

    0x13 airtun-NG - 虚拟通道接口的创造者

    :~# airtun-ng --help
    Airtun-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    Original work: Martin Beck
    http://www.aircrack-ng.org
    usage: airtun-ng <options> <replay interface>
        -x nbpps         : number of packets per second (default: 100)
        -a bssid         : set Access Point MAC address
                         : In WDS Mode this sets the Receiver
        -i iface         : capture packets from this interface
        -y file          : read PRGA from this file
        -w wepkey        : use this WEP-KEY to encrypt packets
        -t tods          : send frames to AP (1) or to client (0)
                         : or tunnel them into a WDS/Bridge (2)
        -r file          : read frames out of pcap file
    WDS/Bridge Mode options:
        -s transmitter   : set Transmitter MAC address for WDS Mode
        -b               : bidirectional mode. This enables communication
                         : in Transmitter's AND Receiver's networks.
                         : Works only if you can see both stations.
    Repeater options:
        --repeat         : activates repeat mode
        --bssid <mac>    : BSSID to repeat
        --netmask <mask> : netmask for BSSID filter
        --help           : Displays this usage screen
    

    0x14 besside-NG - 自动破解WEP和WPA网络

    :~# besside-ng --help
    besside-ng: invalid option -- '-'
    Besside-ng 1.2 beta3 - (C) 2010 Andrea Bittau
    http://www.aircrack-ng.org
    Usage: besside-ng [options] <interface>
    Options:
         -b <victim mac> : Victim BSSID
         -s <WPA server> : Upload wpa.cap for cracking
         -c       <chan> : chanlock
         -p       <pps>  : flood rate
         -W              : WPA only
         -v              : verbose, -vv for more, etc.
         -h              : This help screen
    

    0x15 哥们-NG

    :~# buddy-ng -h
    Buddy-ng 1.2 beta3 - (C) 2007,2008 Andrea Bittau
    http://www.aircrack-ng.org
    Usage: buddy-ng <options>
    Options:
         -h        : This help screen
         -p        : Don't drop privileges
    

    0x16 easside-NG - 一个自动神奇的工具,它可以让你通过一个WEP加密的接入点通信

    :~# easside-ng -h
    Easside-ng 1.2 beta3 - (C) 2007, 2008, 2009 Andrea Bittau
    http://www.aircrack-ng.org
    Usage: easside-ng <options>
    Options:
         -h                : This help screen
         -v   <victim mac> : Victim BSSID
         -m      <src mac> : Source MAC address
         -i           <ip> : Source IP address
         -r    <router ip> : Router IP address
         -s     <buddy ip> : Buddy-ng IP address (mandatory)
         -f        <iface> : Interface to use (mandatory)
         -c      <channel> : Lock card to this channel
         -n                : Determine Internet IP only
    

    0x17 ivstools - 此工具手柄.ivs文件。您可以合并或转换。

    :~# ivstools
    ivsTools 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
     usage: ivstools --convert <pcap file> <ivs output file>
          Extract ivs from a pcap file
         ivstools --merge <ivs file 1> <ivs file 2> .. <output file>
          Merge ivs files
    

    0x18 的kstats

    :~# kstats
    usage: kstats <ivs file> <104-bit key>
    

    0x19 makeivs-NG - 生成初始向量

    :~# makeivs-ng --help
    makeivs-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: makeivs-ng [options]
    Common options:
        -b <bssid> : Set access point MAC address
        -f <num>   : Number of first IV
        -k <key>   : Target network WEP key in hex
        -s <num>   : Seed used to setup random generator
        -w <file>  : Filename to write IVs into
        -c <num>   : Number of IVs to generate
        -d <num>   : Percentage of dupe IVs
        -e <num>   : Percentage of erroneous keystreams
        -l <num>   : Length of keystreams
        -n         : Ignores ignores weak IVs
        -p         : Uses prng algorithm to generate IVs
        --help     : Displays this usage screen
    

    0x20 packetforge-纳克 - 创建随后可以用于注射的加密数据包

    :~# packetforge-ng --help
    Packetforge-ng 1.2 beta3 - (C) 2006-2013 Thomas d'Otreppe
    Original work: Martin Beck
    http://www.aircrack-ng.org
    Usage: packetforge-ng <mode> <options>
    Forge options:
        -p <fctrl>     : set frame control word (hex)
        -a <bssid>     : set Access Point MAC address
        -c <dmac>      : set Destination  MAC address
        -h <smac>      : set Source       MAC address
        -j             : set FromDS bit
        -o             : clear ToDS bit
        -e             : disables WEP encryption
        -k <ip[:port]> : set Destination IP [Port]
        -l <ip[:port]> : set Source      IP [Port]
        -t ttl         : set Time To Live
        -w <file>      : write packet to this pcap file
        -s <size>      : specify size of null packet
        -n <packets>   : set number of packets to generate
    Source options:
        -r <file>      : read packet from this raw file
        -y <file>      : read PRGA from this file
    Modes:
        --arp          : forge an ARP packet    (-0)
        --udp          : forge an UDP packet    (-1)
        --icmp         : forge an ICMP packet   (-2)
        --null         : build a null packet    (-3)
        --custom       : build a custom packet  (-9)
        --help         : Displays this usage screen
    

    0x21 tkiptun-NG - 这个工具能够注入几帧到WPA TKIP网络的QoS

    :~# tkiptun-ng --help
    Tkiptun-ng 1.2 beta3 - (C) 2008-2013 Thomas d'Otreppe
    http://www.aircrack-ng.org
    usage: tkiptun-ng <options> <replay interface>
    Filter options:
        -d dmac   : MAC address, Destination
        -s smac   : MAC address, Source
        -m len    : minimum packet length (default: 80)
        -n len    : maximum packet length (default: 80)
        -t tods   : frame control, To      DS bit
        -f fromds : frame control, From    DS bit
        -D        : disable AP detection
        -Z        : select packets manually
    Replay options:
        -x nbpps  : number of packets per second
        -a bssid  : set Access Point MAC address
        -c dmac   : set Destination  MAC address
        -h smac   : set Source       MAC address
        -e essid  : set target AP SSID
        -M sec    : MIC error timout in seconds [60]
    Debug options:
        -K prga   : keystream for continuation
        -y file   : keystream-file for continuation
        -j        : inject FromDS packets
        -P pmk    : pmk for verification/vuln testing
        -p psk    : psk to calculate pmk with essid
    source options:
        -i iface  : capture packets from this interface
        -r file   : extract packets from this pcap file
        --help              : Displays this usage screen
    

    0x22 wesside-NG - 自动神奇的工具,它集成了多种技术来无缝地获得一个WEP密钥

    :~# wesside-ng -h
    Wesside-ng 1.2 beta3 - (C) 2007, 2008, 2009 Andrea Bittau
    http://www.aircrack-ng.org
    Usage: wesside-ng <options>
    Options:
         -h              : This help screen
         -i      <iface> : Interface to use (mandatory)
         -m      <my ip> : My IP address
         -n     <net ip> : Network IP address
         -a      <mymac> : Source MAC Address
         -c              : Do not crack the key
         -p   <min prga> : Minimum bytes of PRGA to gather
         -v <victim mac> : Victim BSSID
         -t  <threshold> : Cracking threshold
         -f   <max chan> : Highest scanned chan (default: 11)
         -k      <txnum> : Ignore acks and tx txnum times
    

    0x23 wpaclean - 从PCAP文件中删除多余的数据

    :~# wpaclean
    Usage: wpaclean <out.cap> <in.cap> [in2.cap] [...]
    

    0x24 airdriver-ng的用法示例

    :~# airdriver-ng detect
    USB devices (generic detection):
    Bus 002 Device 009: ID 0846:9001 NetGear, Inc. WN111(v2) RangeMax Next Wireless [Atheros AR9170+AR9101]
    Bus 001 Device 012: ID 050d:0017 Belkin Components B8T017 Bluetooth+EDR 2.1
    Bus 001 Device 005: ID 0e0f:0008 VMware, Inc.
    

    0x25 airmon-ng的用法示例

    开始 (开始), 无线接口 (为wlan0) 上监视模式以所需信道 (6):
:~# airmon-ng start wlan0 6
Interface   Chipset     Driver
wlan0       2-2: Atheros    carl9170 - [phy4]
                (monitor mode enabled on mon0)

0x26 airodump中 - ng的用法示例

嗅探上信道 6(-c 6), 上一个BSSID过滤 (-bssid 38:60:77:23:B1:CB) 写入捕获 磁盘 (-w捕获),使用 监控模式接口 (MON0):

:~# airodump-ng -c 6 --bssid 38:60:77:23:B1:CB -w capture mon0
 CH  6 ][ Elapsed: 4 s ][ 2014-05-15 17:21                                         

 BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID

 38:60:77:23:B1:CB  -79   0        7        0    0   6  54e  WPA2 CCMP   PSK  6EA10E                                                                       

 BSSID              STATION            PWR   Rate    Lost    Frames  Probe

0x27 了Aircrack-ng的用法示例

使用所提供的词库 (-w /usr/share/wordlists/nmap.lst), 试图破解的捕获文件 (捕获01.cap) 密码:

:~# aircrack-ng -w /usr/share/wordlists/nmap.lst capture-01.cap 
Opening capture-01.cap
Read 2 packets.
   #  BSSID              ESSID                     Encryption
   1  38:60:77:23:B1:CB  6EA10E                    No data - WEP or WPA
Choosing first network as target.
Opening capture-01.cap

原文来自https://www.hackfun.org/kali-tools/aircrack-ng_zh.html。转载请注明原出处,商用请联系原作者授权。

results matching ""

    No results matching ""