Steps for cracking a Wireless Router password:
1-2 minutes: connect the laptop with a network cable to the wireless router and log on to the wireless router
Step 01
Use a network cable to connect the LAN port of the laptop and wireless router. This
Airmon-ng start wlan0 // set the wireless network card to monitoring mode airodump-ng-I mon0 // obtain the surrounding wireless route information wash-I mon0-C // view support for PIN code cracking wireless route reaver-I mon0-B route MAC
Enable and set the virtual WiFi NIC: run the command: netsh wlan set hostednetwork mode = allow ssid = xiaoyu key = 12345678. This command has three parameters: mode: whether to enable the virtual WiFi Nic, if it is set to disallow, It is disabled.
wireless packets captured from an open (non-WEP protected) network, use the following command:Airdecap-ng-b 00:09:5b:10:bc:5a Open-network.capThe following decrypts a wep-encrypted capture using a hexadecimal WEP key:to decrypt a WEP-encrypted wireless network packet using the hexadecimal form of the WEP key, use the following command:Airdecap-ng-w 11a3e229084349bc25d97e2939 Wep.capThe following decrypts a WPA/WPA2 encrypted capture using the passphr
) , the fetch succeeds, the person jumps to the sixth step , to be re-crawled:Seventh step, enter command air-crack start hackThe parameter bc:46:99:df:6c:72 after-B refers to the BSSIDof the NIC, and one of the last file paths is the data that was heard in the previous stepsudo aircrack-ng-w dict.txt-b bc:46:99:df:6c:72/tmp/airportsniffdamcjh.capAs long as the dictionary is big enough, the password break out should be around the corner, the dictionary can do it yourself, or download onlineCan y
for WPA authentication:
1: PMK (PSK)
2: PTK (PMK, "pairwise key expansion", AA, SA, anonce, snonce)
Brief description of the four handshakes:
1: The Wireless Access Point AP sends a random number anonce to the client Sta.
2: STA receives anonceThen, select a random number snonce, calculate the PMK (PSK) using the WPA password (passphrase) and the ap ssid, and useThe PRF-X function is used to calculate the PTK, and the first 16 bytes of the PTK a
802.11b, G = IEEE 802.11g):Hw_mode=gSet the channel (some drivers use only the value 0):Channel=6Set WPA mode to 2:WPA=2Set your passphrase (WiFi connection password):wpa_passphrase=MywifipasswordSet key and authentication management options for WPA2# # Key Management Algorithm # #Wpa_key_mgmt=WPA-PSK# # Set Cipher Suites(Encryption algorithms)####TKIP=temporal Key Integrity Protocol##CCMP=AES in Counter m
The D-Link router wireless wizard is specially added to the D-Link router for users who do not know much about router settings but want to set up wireless networks.1. Before setting, we must first understand the wireless encryption type. WPA is a Wi-Fi standard designed to improve WEP Security. Compared with WEP, WPA has two major improvements. Www.2cto.com (1) improves data encryption through the temporary Key Integrity Protocol (TKIP). TKIP uses hash operations to disrupt the key, and adds Int
hotspots, we use the classic HOSTAPD tool, which already exists in OpenWrt, directly selected, and then build. Use of HOSTAPD
Then we can view the corresponding use Help
root@ (None):/# hostapd--help
hostapd:invalid Option--'-'
hostapd v2.5
User Space Daemon for IEEE 802.11 aps Management,
IEEE 802.1x/wpa/wpa2/eap/radius Authenticator
Copyright (c) 2002-2015, Jouni Malinen -G Global Control Interface path-
g Group for control interfaces-
p
options for MAC address filtering. 0 means "accept unless in deny List" Macaddr_acl=0 #setting Ignore_broadcast_ssid to 1 would disable the broadcasting of SS ID ignore_broadcast_ssid=0 #Sets Authentication algorithm #1-only Open system authentication #2-both Open System authe Ntication and shared key authentication Auth_algs=1 #Sets WPA and WPA2 authentication##### #wpa option Sets which WPA Implementation to use #1-WPA only #2-
Tags: style io os ar for SP Strong div on2.9. Configure user equivalence (optional)Oracle 11g R2 SSH can also be configured during the installation process.2.9.1. Grid user Equivalence
1. The following are performed with a grid user: Create the. SSH directory in the grid home directory of the two nodes, and give permissions
Linuxrac1[[Email protected] ~] $mkdir ~/.ssh[[Email protected] ~] $chmod 755 ~/.SSH[[Email protected] ~] $SSH-keygen-t RSAGenerating public/private
the private key, and they have added some precautions in SSH and ssh-keygen to prevent misuse of our private key. First, SSH is set to print a large warning message if the file permissions of our key allow anyone other than us to read the key. Second, when we create a public/private key pair with Ssh-keygen, Ssh-keygen asks us to enter a passphrase. If we enter a passphrase, Ssh-keygen will use that
granted the same privileges as ours. Just as we don't want strangers to have the keys to our place, we should protect our private keys from unauthorized use. In the world of bits and bytes, this means that no one is supposed to be able to read or copy our private key.The developers of SSH certainly know the importance of the private key, and they have added some precautions in SSH and ssh-keygen to prevent misuse of our private key. First, SSH is set to print a large warning message if the file
Oracle11g RAC construction in linux (5)4. Establish trust relationships between hosts (node1 and node2)
Establish trust between oracle and grid users between nodes (create a public key and private key through ssh)
Create in node1 and node2 respectively===== Oracle user ==============================
For oracle users:
[Root @ node1/] #Su-oracle
[Oracle @ node1 ~] $Mkdir. sshCreate a hidden directory for. ssh
[Oracle @ node1 ~] $Ls-al
Total 44
-Rw-r -- 1 oracle oinstall 33 Jul 12 :05. bash_logout
existing id_rsa file; If you select "Y" The "~/.ssh/id_rsa" file will be regenerated , followed by a prompt for passphrase, enter OK touse the empty passphrase, again enter the confirmation (this can also output passphrase, which is the equivalent of SSH login password). the "~/.ssh/id_rsa" file and the "~/.ssh/id_rsa.pub" file are regenerated (the results are
Oracle11g RAC construction in linux (5)
4. Establish trust relationships between hosts (node1 and node2)
Establish trust between oracle and grid users between nodes (create a public key and private key through ssh)
Create in node1 and node2 respectively===== Oracle user ==============================
For oracle users:
[Root @ node1/] #Su-oracle
[Oracle @ node1 ~] $Mkdir. sshCreate a hidden directory for. ssh
[Oracle @ node1 ~] $Ls-al
Total 44
-Rw-r -- 1 oracle oinstall 33 Jul 12 :05. bash_log
WPA2: more powerful wireless encryption technology
It may take some time for the full IEEE 802.11i standard to be launched, and the Wi-Fi Alliance wants to enable the new security standard to be deployed as soon as possible to eliminate users'Wireless NetworkSecurity concerns allow the wireless network market to expand quickly. Therefore, the draft of the fifth draft of the IEEE 802.11i (IEEE 802.11i draft 3) of TKIP is developed as a benchmark.WPA. A
Release date:Updated on:
Affected Systems:Huawei B153 3G/UMTS RouterDescription:--------------------------------------------------------------------------------Bugtraq id: 61616
Huawei B153 is a mobile access device.
The firmware version of the Huawei B153 3G/UMTS router is 6.11.405.03.111sp02 and supports the WPS Protocol to facilitate user connection.
By default, WPS programs are configured to accept wps pin authentication requests. If no PIN is configured, you can only use the router butt
latest version of Beta 4.1 released)
(Currently free. I don't know if I will be charged in the future .)
Official Website: http://connectify.me/
Thunder: http://www.connectify.me/djfg72/ConnectifyInstaller.exe
The software interface is full of English, and Chinese has not yet been found, but the method of use is very simple. The following is the software interface:
This allows the software to share the local connection settings before use. The following describes the main function settings:
W
, in this case set to the same as the SSID is Zhangsan, the following figure.
Then click Security, select the Wireless encryption method WPA/WPA2 passphrase, and click Configure, as shown below.
Enter the wireless password in the pop-up interface, click OK, as shown below.
Back to the Profile management interface, click OK again, as shown below.
Click on t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.