|
大家,第一次写教程,写的不好莫见怪,谢谢哈。
看了longas大大的aircrack破解wpa密码的速度贴图,心理很是痒痒,决定自己找资料做wpa table,功夫不负有心人,终于略有小成,借此教程分享出来,希望大家能少走弯路。
1.首先我们要准备2个txt文档,一个是bssid列表,一个是密码档,我这里分别假定bssid档名称为bssid.txt,密码为password.txt,输出的stable为mypass
2.在windows或bt3下执行一下命令,windows下的aircrack记得论坛上有人发过,search一下吧。一下是windows下的一些命令,bt3应该差不多,在bt3下注意大小写和文件所在目录,懒人都放在root下吧,好操作哈哈。
airolib-ng mypass import ascii essid ssid.txt
以下是屏幕回显:
Database does not already exist, creating it...
Database <mypass> sucessfully created
Reading...
Writing...
Done.
airolib-ng mypass import ascii passwd password.txt
以下是屏幕回显:
Reading...
Writing...s read, 0 invalid lines ignored.
Done.
airolib-ng mypass clean all
以下是屏幕回显:
Deleting invalid ESSIDs and passwords...
Deleting unreferenced PMKs...
Analysing index structure...
Vacuum-cleaning the database. This could take a while...
Checking database integrity...
integrity_check
ok
Query done. 2 rows affected.
Done.
airolib-ng mypass batch
以下是屏幕回显:(根据字典大小需要等待一会)
Computed 11***32 PMK in 112 seconds (102 PMK/s, 0 in buffer). All ESSID processed.
Vacuum-cleaning the database. This could take a while...
Checking database integrity...
integrity_check
3.好了我们来检查一下
airolib-ng mypass stats
以下是屏幕回显:
There are 1 ESSIDs and 11***32 passwords in the database. 11***32 out of 11***32 possible combinations have been computed (100%).
ESSID Priority Done
jibao 64 100.0
完成了。
4.接下试试用aircrack破解。(好激动啊哈哈)
aircrack-ng -r mypass *.cap
以下是屏幕回显:
Aircrack-ng 1.0 beta1 r859
[00:00:00] 4386 keys tested (21***05.91 k/s)
KEY FOUND! [ 198****1016 ]
Master Key : B5 60 16 6F 9D C9 6B 98 37 05 59 F9 81 C6 09 9B
29 FF 75 59 EB B2 0D 4C FE E9 63 6A D2 51 FE 7E
Transcient Key : 2D 03 63 7E 24 D3 56 D3 BB 57 B4 46 B8 65 20 D8
7D 61 AB 89 09 2C 4F FF BD 1F AB 70 DC 6B B8 AB
BA 7D 08 5A 7B C2 45 FE 66 CF BA 1B 18 C5 54 B7
1D 3E 0E 52 17 C3 6C 05 F0 74 13 5F 7C 00 5A 36
EAPOL HMAC : 76 A5 2F 6A FF E6 FA 36 83 0B 26 AC 17 2B 14 9B
Quitting aircrack-ng... |
|