connect wireless with command

root@security:/home/offensive# ifconfig wlan0 up
root@security:/home/offensive# airmon-ng start wlan0
root@security:/home/offensive# iwconfig
lo        no wireless extensions.

mon0      IEEE 802.11bgn  Mode:Monitor  Tx-Power=20 dBm   
          Retry  long limit:7   RTS thr=2347 B   Fragment thr:off
          Power Management:on
          
wlan0     IEEE 802.11bgn  ESSID:off/any  
          Mode:Managed  Frequency:2.437 GHz  Access Point: Not-Associated   
          Tx-Power=20 dBm   
          Retry  long limit:7   RTS thr=2347 B   Fragment thr:off
          Encryption key:off
          Power Management:off
          
eth0      no wireless extensions.
 
root@security:/home/offensive# airodump-ng mon0
 CH  7 ][ Elapsed: 0 s ][ 2014-09-11 10:13                                         
                                                                                           
 BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID  
                                                                                  
 C0:61:18:E4:EB:CC  -61        1        1    0  11  54e. WPA2 CCMP   PSK bjbjbjbj                                                                         
 20:DC:E6:9A:8F:CC  -61        3        0    0  11  54e. WPA2 CCMP   PSK  houzhihua                                                                        
 00:90:4C:7E:00:64  -60        3        0    0  11  54   WEP  WEP         Tiger                                                                            
 C8:3A:35:2C:49:60  -61        2        0    0   8  54e. WPA  CCMP   PSK  Tenda_2C4960                                                                     
 C8:3A:35:48:AA:E8  -61        2        0    0   7  54e  WPA  CCMP   PSK  Tenda_48AAE8                                                                     
 1C:FA:68:45:9E:F0  -60        2        0    0   6  54e. WPA2 CCMP   PSK  TP-LINK_459EF0                                                                   
 B0:48:7A:58:D6:16  -61        4        0    0   4  54e. WPA2 CCMP   PSK  magymiao                                                                         
 0C:82:68:4B:52:D0  -61        5        0    0  11  54e. WPA2 CCMP   PSK  air                                                                              
 1C:FA:68:5F:75:60  -60        7        0    0   6  22e. WPA2 CCMP   PSK  4001001111                                                                       
 00:21:27:7A:52:36  -61        4        0    0   6  54 . WPA2 CCMP   PSK  TP-LINK_7A5236                                                                   
 78:A1:06:31:21:04  -60       11        0    0   6  54e. WPA2 CCMP   PSK  freeeeeeee                                                                       
 20:DC:E6:C4:8C:24  -60       10        0    0   6  54e. WPA2 CCMP   PSK  TP                                                                               
 C4:CA:D9:75:23:D0  -61        2        0    0   1  54e. OPN  ChinaNet                                                                                                                                                
 

root@security:/home/offensive# wpa_passphrase freeeeeeee >> /etc/wpa_supplicant/wpa_supplicant.conf
password
root@security:/home/offensive# cat /etc/wpa_supplicant/wpa_supplicant.conf

network={
        ssid="freeeeeeee"
        #psk="password"
        psk=c516763f8072dde7f0dadfc8bb28fed317dea36913ee7c52683e2b134cd35cb7
}
 
root@security:/home/offensive# cat /etc/wpa_supplicant/wifi_connect.sh
#!/bin/sh

# wpa_passphrase ESSID
wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -D wext && dhclient wlan0


Recommend:
http://uceka.com/2013/12/31/wps-pin-cracker-wpawpa2-hack-in-5-second/
http://uceka.com/2013/01/25/wps-ile-wireless-hackwpa-wpa2-2/

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值