MX2 (BCM4330 chip only), MX may not be tested (BCM4329? ), MX3 not.PS: Native Android app, non-virtual machineReaver, I don't know what it is. Look at this http://tieba.baidu.com/p/2682878857.Grab packet hack wifi password:Http://pan.baidu.com/s/19qQ3MInstall 4 packages in turn, note that after the BusyBox installation is complete, you need to open a second installation, restart your phone after installing four packagesOpen Bcmon, click Install, then tap to start listening mode, press home to re
occurs in step 1, remove -- dry-run and execute it again.4. recompile and install the kernel moduleMake clean make modules_installCopy ARCH/i386/boot/bzimage/boot/Kernel File Name5. RestartNote: For kernels earlier than 2.6.28, the following patches may need to be installed. The steps are the same (in the Appendix 1, foreigners say 2.6.28 kernel does not need to be patched)Wget requests:
OK! Now your rtl8187 can support injection, aircrack-ng no pr
Ready to work: Make sure the wireless card supports promiscuous mode and works properly. (Self-brought network card does not support promiscuous)Ifconfig command If you cannot see the wireless card, use Ifconfig-a to view all the adapters, find the corresponding assigned name of the wireless network card (such as Wlan0), Ifconfig wlan0 up enabled.1.airmon-ng Check detects the process that consumes the NIC and kills it to ensure that the network card is running without interference.2.airmon-ng st
passwordVi. possible problems 1, receive on CHANNEL-1 errorStep 3.3 Executionaireplay-ng-0 2-a c0:xx:xx:xx:xx:00-c 14:xx:xx:xx:xx:b4 mon0Prompt error:11:41:04 waiting for beacons frame (BSSID: XX:XX:XX:XX:XX:XX) on channel-111:41:04 couldn ' t determine Current channel for Mon0, should either force the operation with--ignore-negative-one or apply a kernel patchplease s Pecify an ESSID (-e).Workaround:(1) Ensure that the window in step 3.1 is closed.(2) Ensure the execution of the command in
values exactly how much. Fourth step: Airodump-ng--ivs-w longas-c 1 wlan0mon start grabbing the bag! The subcontracting file is under the current folder Longas-01.ivs #--ivs is filtered through IVs, only the message that can break the password is reserved. ivs file, so faster;-W is the write of the captured message is named ABC and saved (then saved in the current folder as Abc-01.ivs);-C followed by the channel, such as 6. Fifth step: Then open a new terminal window, Deauth atta
1. you can use airodump-ng as the sniffer. You can use airdecap-ng to unpack captured packets (for example, airdecap-ng-W wepkey file. and then use Wireshark to open the captured content ., autorization is a base64-encoded router user name and
Use Ubuntu to crack wep wireless encryption I. Install ubuntu and aircrack-ngFirst install the latest Ubuntu version and update the system to the latest version.Enter sudo apt-get install aircrack-ng in the terminal to install aircrack-ng.If you are not connected to the Internet, go to another computer and download the aircra
://backtrack.mjdupree.com/bt3b141207.rar
Ftp://bt3.aircrack-ng.org/bt3b141207.rar
After downloading, you can install it in a boot-able USB flash drive or directly drop it onto the hard disk. Later I will explain how to use the hard disk to start it directly.
----------------- How to change to a boot disk --------------------
The optical disk version is ready after burning.
The USB version can be decompressed to the root directory of a USB flash drive.
information such as "physical address. In this window, the letters and numbers that constitute the MAC address are separated by dashes. The purpose of dashes is to make these characters clearer, however, the actual MAC address does not have these dashes.
Figure 8: MAC address displayed in network connection details
3. Laptop settings
First, we need to prepare several tools (Kismet, Airodump, Void11, Aireplay, and Aircrack) required to crack the WEP K
exceeded 30 GB.
Create WPA hash tables
Create a hash: genpmk
Use hash:
Cowpatty
Http://www.school51.com/News/Content_43384.html
Note: The password dictionary is in Linux text format, with only line breaks (/n) in each line, while lines in Windows notepad format will encounter line breaks (/R/n) in pairs.
Text File Format Conversion: http://blog.csdn.net/zhangyang0402/archive/2010/01/07/5153649.aspx
Or use Vim to convert: http://hi.baidu.com/qq5910225/blog/item/4ccb2e98c2167bb9c8eaf458.html
GPU
not appear during the cracking process.
2. capture data packets with airodump
Now we know the basic information needed for cracking. It's time to start using the airodump tool. The main task of airodump is to capture data packets and create a file containing captured data for aircrack. On either of the two computers used for attack and cracking, I use the attack computer. Open a shell window and enter the following command:
Iwconfig wlan0 m
start the boot system, that is, BT2. After entering the system, go to the Shell interface and enter "startx" to enter the graphic interface.
In the graphic interface, open a Shell and enter"Ifconfig-A: view the current Nic. Here, I use a USB Nic as an example. We can see that there is a NIC named rausb0. The status is not loaded. Here, the NIC driver is not loaded.
Many new users will face the problem of unsupported Nic drivers when cracking WPA. Here, we want to ensure that more Nic drivers
The reason why I wrote these columns is that many people are puzzled when using Linux. As a hacker, Linux skills are irreplaceable attack tools.
Because Linux has a file directory structure different from Mac OS and Windows, many new users will have a question when they first use Linux-how to find files. Before starting, make sure that you have mastered the contents of my previous articles (1, 2, and 3 ).
Step 1: find a file in the directory)
The first one to show you is the find command. Litera
Crack wireless networks in Ubuntu
1. Install ubuntu and aircrack-ngFirst install Ubuntu and update the system to the latest version.Enter sudo apt-get install aircrack-ng in the terminal to install aircrack-ng.If you are not connected to the Internet, go to another computer and download the aircrack-ng Ubuntu DEB insta
First, install Ubuntu and Aircrack-ngInstall Ubuntu First, update your system to the latestInput sudo apt-get install aircrack-ng installation in terminal Aircrack-ngNo Internet connection to other computers. Download Aircrack-ng Ubuntu deb Install package: Http://packages.ubuntu.com/zh-cn/jaunty/i386/
as Wireshark. You should also be able to use Kismet or NetStumbler to complete the check, but Wireshark can also help you determine whether the unit uses MAC filtering. If yes, you need to use the MAC spoofing tool. Change-Mac is a MAC spoofing tool that can be used to modify the MAC address of your computer and bypass MAC address filtering. Change-Mac can be downloaded from here: http://www.softpedia.com/get/security/security-related/change-mac.shtml. After you determine whether MAC filtering
penetration testing, burp Suite is also a must-learn tool.Burp Suite Learning MaterialsVideo: Https://www.concise-courses.com/hacking-tools/videos/category/7/burp-suiteBook: https://www.concise-courses.com/books/burp-suite/Similar tools: https://www.concise-courses.com/hacking-tools/web-vulnerability-scanners/ Password hack: THC HydraTHC Hydra is a very popular password hack that was developed by a very active and experienced development team. Basically THC Hydra is a fast and stable network lo
To crack WEP on OS X, you must have the ability to discover KisMAC and Aircrack-ng. KisMAC can reinject data packets to generate data communication, but it lacks the advanced encryption PTW attack of Aircrack-ng. This means you need to configure KisMAC to capture all communication packets to the pcap file (KisMAC | Preferences (Preferences) | Driver | Keep Everything (save all data )), then pass the pcap to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.