Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Automatically crack WiFi password with besside-ng

$
0
0

besside-ng is a tool like Wesside-ng but it support also WPA encryption. It will automatically crack all the WEP networks in range and log the WPA handshakes. WPA handshakes captured can be uploaded to the online cracking service at Darkircop.org (Besside-ng Companion) to attempt to get the password and where provides useful statistics based on user-submitted capture files about the feasibility of WPA cracking.

Requirements Aircrack-ng SVN version Wireless inteface with working injection Automatically crack WEP & WPA password with besside-ng root@kali:~# besside-ng -h Besside-ng 1.2 rc4 - (C) 2010 Andrea Bittau http://www.aircrack-ng.org Usage: besside-ng [options] <interface> Options: -b <victim mac> : Victim BSSID -R <victim ap regex> : Victim ESSID regex -s <WPA server> : Upload wpa.cap for cracking -c <chan> : chanlock -p <pps> : flood rate -W : WPA only -v : verbose, -vv for more, etc. -h : This help screen besside-ng Usage Example

Attack WPA only ( -W ), display verbose output ( -v ) and use monitor mode interface wlan0mon .

root@kali:~# besside-ng -W -v wlan0mon [18:39:34] mac 3c:46:d8:4e:ef:aa [18:39:34] Let's ride [18:39:34] Appending to wpa.cap [18:39:34] Appending to wep.cap [18:39:34] Logging to besside.log [18:39:35] Found AP 44:3a:cb:38:51:42 [watwutwot] chan 1 crypto WPA dbm -49 [18:39:35] Found AP 4c:8b:30:83:ed:91 [TELUS3079-2.4G] chan 1 crypto WPA dbm -71 [18:39:35] Found AP 1c:87:2c:d3:34:18 [Kuroki] chan 3 crypto WPA dbm -89 [18:39:37] Found AP 4c:8b:30:24:71:75 [SAMUEL9] chan 8 crypto WPA dbm -73 [18:39:37] Found AP 0c:51:01:e6:01:c4 [fbi-van-24] chan 11 crypto WPA dbm -46 [18:39:37] Found AP 70:f1:96:8e:5c:02 [TELUS0455-2.4G] chan 11 crypto WPA dbm -78 [18:39:38] Found client for network [Kuroki] 90:06:28:cb:0f:f3 [18:39:41] Found AP f0:f2:49:3c:ec:a8 [fbi-van-24] chan 1 crypto WPA dbm -49 [18:39:42] Found AP bc:4d:fb:2c:6d:88 [SHAW-2C6D80] chan 6 crypto WPA dbm -77 [18:39:42] Found client for network [SHAW-2C6D80] 64:5a:04:98:e1:62 [18:39:43] Found AP 10:78:5b:e9:a4:e2 [TELUS2151] chan 11 crypto WPA dbm -49 [18:39:43] Found client for network [fbi-van-24] 60:6b:bd:5a:b6:6c Usage Tips Besside-ng-Crawler

Tool to cleanup WPA handshakes PCAP files in a directory and save them to an output file.

Source:

Author: Andrea Bittau (sorbo)

License: GPLv2


Viewing all articles
Browse latest Browse all 12749

Latest Images

Trending Articles





Latest Images