root@security:/home/offensive# ifconfig wlan0 up root@security:/home/offensive# airmon-ng start wlan0 |
root@security:/home/offensive# iwconfig lo no wireless extensions. mon0 IEEE 802.11bgn Mode:Monitor Tx-Power=20 dBm Retry long limit:7 RTS thr=2347 B Fragment thr:off Power Management:on wlan0 IEEE 802.11bgn ESSID:off/any Mode:Managed Frequency:2.437 GHz Access Point: Not-Associated Tx-Power=20 dBm Retry long limit:7 RTS thr=2347 B Fragment thr:off Encryption key:off Power Management:off eth0 no wireless extensions. |
root@security:/home/offensive# airodump-ng mon0 CH 7 ][ Elapsed: 0 s ][ 2014-09-11 10:13 BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID C0:61:18:E4:EB:CC -61 1 1 0 11 54e. WPA2 CCMP PSK bjbjbjbj 20:DC:E6:9A:8F:CC -61 3 0 0 11 54e. WPA2 CCMP PSK houzhihua 00:90:4C:7E:00:64 -60 3 0 0 11 54 WEP WEP Tiger C8:3A:35:2C:49:60 -61 2 0 0 8 54e. WPA CCMP PSK Tenda_2C4960 C8:3A:35:48:AA:E8 -61 2 0 0 7 54e WPA CCMP PSK Tenda_48AAE8 1C:FA:68:45:9E:F0 -60 2 0 0 6 54e. WPA2 CCMP PSK TP-LINK_459EF0 B0:48:7A:58:D6:16 -61 4 0 0 4 54e. WPA2 CCMP PSK magymiao 0C:82:68:4B:52:D0 -61 5 0 0 11 54e. WPA2 CCMP PSK air 1C:FA:68:5F:75:60 -60 7 0 0 6 22e. WPA2 CCMP PSK 4001001111 00:21:27:7A:52:36 -61 4 0 0 6 54 . WPA2 CCMP PSK TP-LINK_7A5236 78:A1:06:31:21:04 -60 11 0 0 6 54e. WPA2 CCMP PSK freeeeeeee 20:DC:E6:C4:8C:24 -60 10 0 0 6 54e. WPA2 CCMP PSK TP C4:CA:D9:75:23:D0 -61 2 0 0 1 54e. OPN ChinaNet |
root@security:/home/offensive# wpa_passphrase freeeeeeee >> /etc/wpa_supplicant/wpa_supplicant.conf ssid="freeeeeeee" #psk="password" psk=c516763f8072dde7f0dadfc8bb28fed317dea36913ee7c52683e2b134cd35cb7 } |
root@security:/home/offensive# cat /etc/wpa_supplicant/wifi_connect.sh #!/bin/sh # wpa_passphrase ESSID wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -D wext && dhclient wlan0 |
Recommend:
http://uceka.com/2013/12/31/wps-pin-cracker-wpawpa2-hack-in-5-second/
http://uceka.com/2013/01/25/wps-ile-wireless-hackwpa-wpa2-2/