BT5很多网卡不支持,也就是BT5里面没有加载驱动,你可以用命令把驱动加载进去,这个有点复杂。
一般BT5支持 8187 3070的芯片,这个淘宝一大堆,自己选。
8187绝对的破解蹭网利器,基本的破解软件都支持8187,一般的8187几十块不等,好点的像U20 ;钻石级都是破解的经典,价格比较贵,100+。淘宝很多很多假的,要小心。
我是8187的忠实用户,家里一大堆8187,当然3070相对稳定点,但是破解的注入速度没8187的快。

Wifite v2 is now available

Get the latest version on Github

What's new in this version:

  • support for cracking WPS-encrypted networks (via reaver)
  • 2 new WEP attacks
  • more accurate WPA handshake capture
  • various bug fixes

Version 2 does not include a GUI, so everything must be done at the command-line.

mention in the New York Times

Wifite was mentioned in the New York Times' article "New Hacking Tools Pose Bigger Threats to Wi-Fi Users" from February 16, 2011. Here is a link to the article.

introduction

Designed and tested on Linux; works with Backtrack 5, BlackBuntu, BackBox, and Pentoo! Linux only; no windows or OSX support (but you're welcome to try).

purpose

To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the "set it and forget it" wireless auditing tool.

features

  • sorts targets by signal strength (in dB); cracks closest access points first
  • automatically de-authenticates clients of hidden networks to reveal SSIDs
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • customizable settings (timeouts, packets/sec, etc)
  • "anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete
  • all captured WPA handshakes are backed up to wifite.py's current directory
  • smart WPA de-authentication; cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit
  • displays session summary at exit; shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py -upgrade

requirements

  • linux operating system (confirmed working on Backtrack 5, BackBox, BlackBuntu, Pentoo, Ubuntu 8.10 (BT4R1), Ubuntu 10.04, Debian 6, Fedora 16)
  • tested working with python 2.6.x, and python 2.7.x,
  • wireless drivers patched for monitor mode and injection. Most security distributions (Backtrack, BlackBuntu, etc) come with wireless drivers pre-patched,
  • aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or at the aircrack-ng website,

suggested applications

  • reaver, for attacking WPS-encrypted networks
  • pyrit, cowpatty, tshark: not required, but help verify WPA handshake captures

For help installing any of these programs, see the installation guide (hosted on github)

execution

download the latest version:

wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py

change permissions to executable:

chmod +x wifite.py

execute:

python wifite.py

or, to see a list of commands with info:

./wifite.py -help

screenshots

successful WEP attack (after 90 seconds):

successful WPS attacks (after 17 hours):

video tutorial

(tutorial is for v1 of wifite. new videos coming soon)

capturing WPA handshake using Wifite (and then cracking with oclHashCat).

deo credit: Maurizio Schmidt

examples

the program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated -- no supervision required.

to crack all WEP access points:

./wifite.py -all -wep

to crack all WPS access points with signal strength greater than (or equal to) 50dB:

./wifite.py -p 50 -wps

to attack all access points, use 'darkc0de.lst' for cracking WPA handshakes:

./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst

to attack all WPA access points, but do not try to crack -- any captured handshakes are saved automatically:

./wifite.py -all -wpa --dict none

to crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec:

./wifite.py --pow 50 -wept 300 -pps 600

to attempt to crack WEP-encrypted access point "2WIRE752" endlessly -- program will not stop until key is cracked or user interrrupts with ctrl+C):

./wifite.py -e "2WIRE752" -wept 0

Wifite批量破解WEP/WPA/WPS相关推荐

  1. 【网络科普】Wi-Fi 安全接入方法 - WEP, WPA, WPS

    登入Wi-Fi必须选择一个网络名称和提供密码(Wi-Fi网络也可以不使用密码) 有几种同的协议用于保护 Wi-Fi 网络安全. WEP(wired equivalent privacy)- 优先等效保 ...

  2. 使用Aircrack-ng工具破解WEP、WPA/WPA2加密的无线网络

    特别声明:本文是参照"9.2 使用Aircrack-ng工具破解无线网络"进行实验的.链接为:https://wizardforcel.gitbooks.io/daxueba-ka ...

  3. [backtrack教程]从零开始,教你如何破解WEP、WPA无线网络

    http://www.backtrack.org.cn/viewthread.php?tid=1000 [backtrack教程]从零开始,教你如何破解WEP.WPA无线网络 教程, 网络, WPA, ...

  4. 从零开始,教你如何破解WEP、WPA无线网络 密码

    近些年无线技术发展迅速,越来越多的用户开始使用无线网络,最近新搬到一小区没有安装网络,后面想到以前出差时在机场用过无线网络,小区内是否也有无线网络呢?随便一搜,果然有几个无线网络信号,于是打起了免费蹭 ...

  5. 从零开始破解WEP、WPA无线网络

    以前出差时在机场用过无线网络,小区内是否也有无线网络呢?随便一搜,果然有几个无线网络信号,于是打起了免费蹭网的主意,但信号最好的几个网络的WEP或WPA密码成为了一个门坎,于是在公司上网查到相关资料, ...

  6. 破解WEP和WPA加密的无线网络

    今天讲讲Aircrack-ng,这是一个基于破解无线802.11协议的wep及wpa-psk加密的工具.补充一点,这种破解方法是在网卡的基础上进行的. 破解wep加密的无线网络:现在命令行输入airm ...

  7. WEP WPA WPA2 破解实验

    WEP WPA WPA2 破解实验 1.破解平台 虚拟机:很多内置网卡不支持 u盘启动盘:一般比较全的系统都支持 usb安装工具unetbootin: http://unetbootin.source ...

  8. Aircrack-ng: (2) WEP WPA/WPA2 破解

    作者:枫雪庭 出处:http://www.cnblogs.com/FengXueTing-px/ 欢迎转载 目录 一. WEP 破解 二. wpa/wpa2 破解 一. WEP 破解 注:步骤前,确保 ...

  9. WEP/WPA/WPA2加密标准有什么区别?

    WEP/WPA/WPA2加密标准有什么区别? 大多数的公共场合 WiFi 是不加密的,但居住区却是常见一些使用 WAP 和 WAP2 加密标准的 Wi-Fi 信号.可能很多用户在设置路由器加密标准的时 ...

  10. 无线WiFi安全渗透与攻防(五)之aircrack-ng破解WEP加密

    系列文章 无线WiFi安全渗透与攻防(一)之无线安全环境搭建 无线WiFi安全渗透与攻防(二)之打造专属字典 无线WiFi安全渗透与攻防(三)之Windows扫描wifi和破解WiFi密码 无线WiF ...

最新文章

  1. 如何在实际中计划和执行一个机器学习和深度学习项目
  2. Web API应用架构设计分析(1)
  3. jsonp请求url长度过长的替代(ajaxcdr的使用)
  4. 开源 java CMS - FreeCMS2.6 静态化管理
  5. linux多进程编程计算圆周率,中值积分定理计算PI值的多线程实现
  6. Web安全学习Week5
  7. 准备写个nhibernate的学习笔记
  8. java数据库编程——执行SQL 语句
  9. data自定义属性获取方法和设置
  10. 科研福利!北京超算获AI Perf500总量份额第一,200元卡时免费领取
  11. Exception in thread “main“ java.lang.ClassCastException 类型转换异常
  12. [IOS/Swift]'Project Name' was compiled with optimization
  13. 故意伤害罪具体会有什么处罚
  14. 如何消除文法二义性、如何判断二义文法—编译原理
  15. 分数阶傅里叶变换(FrFT)详细原理与matlab代码实现
  16. python知识点智能问答_基于检索的智能问答
  17. 程序员,5个步骤改善你的英语阅读技能
  18. 开源CMS框架整理收集
  19. windows下secureCRT远程登录virtualbox-ubu
  20. 初学JAVA-8-对象和类、面向过程和面向对象

热门文章

  1. k2 abc 官改固件下载_abc分析,k表示聚类
  2. Windows命令之ping命令
  3. CDR话单主要字段介绍
  4. Optisystem中器件的学习(1-Visualizer Library、Sensors)
  5. 挑战程序设计竞赛是c语言编写的嘛,POJ 2115 C Looooops 题解《挑战程序设计竞赛》...
  6. 免费开源字体_7种华丽的免费开源字体以及何时使用它们
  7. LittlevGL 开源图形库
  8. 自适应漫画手机APP应用下载页源码
  9. eclipse安装包
  10. 怎样使用Google chrome播放 .swf 文件