Wifitap包装说明
Wifitap是概念上使用流量注入WiFi网络通信的证明。 Wifitap允许任何应用程序都发送和接收IP数据包使用802.11流量捕获和注入通过WiFi网络简单配置wj0,这意味着:
- 设置与目标网络地址范围相一致的IP地址
- 路由通过它所需的业务 尤其是,它是对任意的报文注射在没有特定的库802.11帧的廉价方法。 此外,它会允许一个摆脱任何限制设定在接入点的水平,如绕过客户端之间的通讯防御系统(如思科PSPF)或达到多SSID由同一个接入点进行处理。 资料来源:http://sid.rstack.org/static/articles/w/i/f/Wifitap_EN_9613.html
- 作者:塞德里克热烫
- 许可:GPL第二版
0x01 包含在wifitap包工具
wifiarp - 无线注入ARP应答工具基于Wifitap:~# wifiarp -h Psyco optimizer not installed, running anyway... INFO: did not find python gnuplot wrapper . Won't be able to plot INFO: Can't open /etc/ethertypes file Usage: wifitap -b <BSSID> -s <HWSRC> [-o <iface>] [-i <iface>] [-w <WEP key> [-k <key id>]] [-d [-v]] [-h] -b <BSSID> specify BSSID for injection -s <HWSRC> specify source MAC address for 802.11 and ARP headers -o <iface> specify interface for injection (default: ath0) -w <key> WEP mode and key -k <key id> WEP key id (default: 0) -d activate debug -v verbose debugging -h this so helpful output
0x02 wifidns - 无线注射DNS应答工具基于Wifitap
:~# wifidns -h Psyco optimizer not installed, running anyway... INFO: did not find python gnuplot wrapper . Won't be able to plot INFO: Can't open /etc/ethertypes file Usage: wifidns -b <BSSID> -a <IP> [-o <iface>] [-i <iface>] [-s <SMAC>] [-t <TTL>] [-w <WEP key>] [-k <key id>]] [-d [-v]] [-h] -b <BSSID> specify BSSID for injection -a <IP> specify IP address for DNS answers -t <TTL> Set TTL (default: 64) -o <iface> specify interface for injection (default: ath0) -i <iface> specify interface for listening (default: ath0) -s <SMAC> specify source MAC address for injected frames -w <key> WEP mode and key -k <key id> WEP key id (default: 0) -d activate debug -v verbose debugging -h this so helpful output
0x03 wifiping - 基于Wifitap的WiFi注射基于应答工具
:~# wifiping -h Psyco optimizer not installed, running anyway... INFO: did not find python gnuplot wrapper . Won't be able to plot INFO: Can't open /etc/ethertypes file Usage: wifitap -b <BSSID> [-t <TTL>] [-o <iface>] [-i <iface>] [-s <SMAC>] [-w <WEP key> [-k <key id>]] [-d [-v]] [-h] -b <BSSID> specify BSSID for injection -t <TTL> Set TTL (default: 64) -o <iface> specify interface for injection (default: ath0) -i <iface> specify interface for listening (default: ath0) -s <SMAC> specify source MAC address for injected frames -w <key> WEP mode and key -k <key id> WEP key id (default: 0) -d activate debug -v verbose debugging -h this so helpful output
0x04 wifitap - 通过TUN / TAP设备的WiFi注入工具
:~# wifitap -h Psyco optimizer not installed, running anyway... INFO: did not find python gnuplot wrapper . Won't be able to plot INFO: Can't open /etc/ethertypes file Usage: wifitap -b <BSSID> [-o <iface>] [-i <iface>] [-s <SMAC>] [-w <WEP key> [-k <key id>]] [-d [-v]] [-h] -b <BSSID> specify BSSID for injection -o <iface> specify interface for injection (default: ath0) -i <iface> specify interface for listening (default: ath0) -s <SMAC> specify source MAC address for injected frames -w <key> WEP mode and key -k <key id> WEP key id (default: 0) -d activate debug -v verbose debugging -h this so helpful output
0x05 wifitap用法示例
:~# coming soon
原文来自https://www.hackfun.org/kali-tools/wifitap_zh.html。转载请注明原出处,商用请联系原作者授权。