السلام عليكم ورحمة الله وبركاتة
كيف الحال ان شاء الله بخير الحقيقة هذا الاداة القوية والمعروفة انها على الينكس هيا موجودة على الويندوز لكن ما لقيت اي شرح لها في المنتديات العربية وقلت احط لكم شرحها
اداة اختراق شبكة wpa الصعب كسرها تعتمد على التخمين والصراحة انا انصح استخدمها في جو الينكس الشرح في الغة الانجليزية
unning Aircrack-ng for Windows:
Once as many IVs as required have been captured using the airodump packet capture utility the resultant [file****].cap file can be imported into aircrack to break the static WEP or WPA-PSK keys.
To view all available switches:
cd c:\aircrack-ng-[version]
aircrack-ng*****
[/size
$
Basic usage: aircrack -q -n [WEP key length] -b [BSSID] [file****].cap
Breaking WEP:
As you can see the capture file in use below (capture1.ivs) was created with airodump capture option "Only capture WEP IVs (y/n)" set to "y" as the resultant file is in the .ivs format. If n had been selected the resultant file would be in the .cap format.
Whilst this will work, we can could have cut down the cracking options for Aircrack-ng by specifying the WEP key length (-n) or by specifying the target AP MAC address (-b) on the command line:
aircrack -a 1 -q -n 128 -b 11:11:11:11:11:11 capture1.ivs (Where 11:11:11:11:11:11 = Target AP's MAC address)
As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in only 4 seconds.
The capture file itself (capture1.ivs) is included here to test your own aircrack installs (note: the file is a 5.77mb download
Breaking WPA:
In order to be carry out the WPA dictionary attack using aircrack-ng we either have to:
1. Wait for a WPA client to associate to the network (This could take a while)
2. Force a WPA client off the network, forcing it to reassociate.
Either of these two method allows us to capture the WPA handshake, which is what we require to perform a dictionary attack.
The downside to using this Windows version of aircrack-ng is that there are not any freely available tools to perform this attack. So we have to either use a Linux tools (e.g. aireplay or void11) or wait for an association to occur.
Which ever way we gather the WPA handshake we still use the same tool; airodump.
Once we think we have captured the WPA handshake, we simply run the capture file through aircrack for confirmation:
[size=24]If have confirmed we have the WPA handshake (as above) we can attempt the dictionary attack:
As you can see above aircrack found the WPA PSK of "passphrase"
The capture file itself (capture2.cap) is included here to test your own aircrack installs
وانتو ترجمو ان شاء الله افدتكم
اذا عجبكم الموضوع قيموني
كيف الحال ان شاء الله بخير الحقيقة هذا الاداة القوية والمعروفة انها على الينكس هيا موجودة على الويندوز لكن ما لقيت اي شرح لها في المنتديات العربية وقلت احط لكم شرحها
اداة اختراق شبكة wpa الصعب كسرها تعتمد على التخمين والصراحة انا انصح استخدمها في جو الينكس الشرح في الغة الانجليزية
unning Aircrack-ng for Windows:
Once as many IVs as required have been captured using the airodump packet capture utility the resultant [file****].cap file can be imported into aircrack to break the static WEP or WPA-PSK keys.
To view all available switches:
cd c:\aircrack-ng-[version]
aircrack-ng*****
[/size
$
Basic usage: aircrack -q -n [WEP key length] -b [BSSID] [file****].cap
Breaking WEP:
As you can see the capture file in use below (capture1.ivs) was created with airodump capture option "Only capture WEP IVs (y/n)" set to "y" as the resultant file is in the .ivs format. If n had been selected the resultant file would be in the .cap format.
Whilst this will work, we can could have cut down the cracking options for Aircrack-ng by specifying the WEP key length (-n) or by specifying the target AP MAC address (-b) on the command line:
aircrack -a 1 -q -n 128 -b 11:11:11:11:11:11 capture1.ivs (Where 11:11:11:11:11:11 = Target AP's MAC address)
As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in only 4 seconds.
The capture file itself (capture1.ivs) is included here to test your own aircrack installs (note: the file is a 5.77mb download
Breaking WPA:
In order to be carry out the WPA dictionary attack using aircrack-ng we either have to:
1. Wait for a WPA client to associate to the network (This could take a while)
2. Force a WPA client off the network, forcing it to reassociate.
Either of these two method allows us to capture the WPA handshake, which is what we require to perform a dictionary attack.
The downside to using this Windows version of aircrack-ng is that there are not any freely available tools to perform this attack. So we have to either use a Linux tools (e.g. aireplay or void11) or wait for an association to occur.
Which ever way we gather the WPA handshake we still use the same tool; airodump.
Once we think we have captured the WPA handshake, we simply run the capture file through aircrack for confirmation:
[size=24]If have confirmed we have the WPA handshake (as above) we can attempt the dictionary attack:
As you can see above aircrack found the WPA PSK of "passphrase"
The capture file itself (capture2.cap) is included here to test your own aircrack installs
وانتو ترجمو ان شاء الله افدتكم
اذا عجبكم الموضوع قيموني
الجمعة سبتمبر 16, 2011 12:05 am من طرف y2ss
» اسهل كتاب لتعليم الفيجوال بيسك 6 للمبتدئين
الخميس سبتمبر 01, 2011 4:28 pm من طرف hassan
» درس عمل متصفح Internet Explorer
الخميس سبتمبر 01, 2011 4:23 pm من طرف hassan
» دروة تعلم الفيجول بيسك من الصفر للاحتراف عربيه صوت وصوره
الخميس سبتمبر 01, 2011 4:20 pm من طرف hassan
» معلومات عن لغات البرمجة
الخميس سبتمبر 01, 2011 4:16 pm من طرف Admin
» التـعرف على ادوات عرض الملفات بشكل اوسع ...تطبيق مثال ..!
الخميس سبتمبر 01, 2011 4:15 pm من طرف Admin
» برنامج Visual Basic 2008 بحجم لا يتعدى 3 ميجا
الخميس سبتمبر 01, 2011 4:10 pm من طرف Admin
» اختراق الشبكات اللاسلكيه والحصول على اشتراكات مجانيه طريقه مجربه ومضمونه 90%
الأربعاء أغسطس 31, 2011 7:31 pm من طرف refland
» كيفية اختراق الشبكات الداخلية
السبت يونيو 25, 2011 12:22 am من طرف lhabib