4: 2019-11-10 (日) 16:39:10 admin | 現: 2021-07-13 (火) 11:54:36 iseki | ||
---|---|---|---|
Line 2: | Line 2: | ||
- WPA/WPA2 用解析ソフト | - WPA/WPA2 用解析ソフト | ||
+ | - Python2 用 (2020 1/16 python3 未対応) | ||
- GPU使用可能 | - GPU使用可能 | ||
- https://github.com/JPaulMora/Pyrit | - https://github.com/JPaulMora/Pyrit | ||
+ | -- git clone https://github.com/JPaulMora/Pyrit.git | ||
#br | #br | ||
*** Usage [#kccf1615] | *** Usage [#kccf1615] | ||
- | **** 解析 [#ec44a34f] | + | **** 簡単な解析 [#ec44a34f] |
- pyrit -r pcap_file analyze | - pyrit -r pcap_file analyze | ||
+ | #br | ||
+ | **** 解析用データベースを作成して攻撃 [#f0f8f84a] | ||
+ | - pyrit -i /usr/share/wordlists/metasploit/password.lst import_passwords | ||
+ | - pyrit -r cap_file analyze | ||
+ | - pyrit -e ESSID create_essid | ||
+ | - pyrit batch | ||
+ | - pyrit -r cap_file attack_db | ||
#br | #br | ||
**** 辞書攻撃 [#wc1aaefa] | **** 辞書攻撃 [#wc1aaefa] | ||
- | - pyrit -r pacp_file -i password_file -e ESSID attack_passthrough | + | - pyrit -r pacp_file -i password_file [-e ESSID] attack_passthrough |
+ | #br | ||
+ | |||
+ | **** Brute-Force Attack [#cbd8c839] | ||
+ | - [[crunch]] 8 8 | pyrit -r pacp_file -i - [-e ESSID] attack_passthrough | ||
+ | - ワード生成プログラムに依存する | ||
+ | #br | ||
+ | |||
+ | *** Demo [#sd6408ae] | ||
+ | |||
+ | #br | ||
+ | |||
+ | *** for CentOS [#t4f4438b] | ||
+ | - yum install python-devel | ||
+ | - cd Pyrit | ||
+ | - ./setup.py build | ||
+ | - ./setup.py install | ||
#br | #br | ||
Line 21: | Line 45: | ||
- cd Pyrit | - cd Pyrit | ||
- ./setup.py build | - ./setup.py build | ||
- | - ./setup.pt install | + | - ./setup.py install |
#br | #br | ||
Line 34: | Line 59: | ||
**** git [#z650b2b3] | **** git [#z650b2b3] | ||
- | - https://github.com/JPaulMora/Pyrit | + | |
- module/cpyrit_cuda | - module/cpyrit_cuda | ||
-- setup.py の L88 の ''-ccbin clang'' の箇所を削除 | -- setup.py の L88 の ''-ccbin clang'' の箇所を削除 |
- Pyrit のバックアップ一覧
- Pyrit のバックアップの現在との差分(No. All)