6: 2020-01-08 (水) 11:35:45 iseki | 現: 2021-07-13 (火) 11:54:36 iseki | ||
---|---|---|---|
Line 2: | Line 2: | ||
- WPA/WPA2 用解析ソフト | - WPA/WPA2 用解析ソフト | ||
+ | - Python2 用 (2020 1/16 python3 未対応) | ||
- GPU使用可能 | - GPU使用可能 | ||
- https://github.com/JPaulMora/Pyrit | - https://github.com/JPaulMora/Pyrit | ||
Line 11: | Line 12: | ||
- pyrit -r pcap_file analyze | - pyrit -r pcap_file analyze | ||
#br | #br | ||
- | **** 解析用データベースの作成 [#f0f8f84a] | + | **** 解析用データベースを作成して攻撃 [#f0f8f84a] |
- | - pyrit -e ESSID create_essid | + | - pyrit -i /usr/share/wordlists/metasploit/password.lst import_passwords |
+ | - pyrit -r cap_file analyze | ||
+ | - pyrit -e ESSID create_essid | ||
+ | - pyrit batch | ||
+ | - pyrit -r cap_file attack_db | ||
#br | #br | ||
- | **** データベースにパスワードを入力 [#g3e1bbc1] | + | |
- | - pyrit -i password_file import_passwords | + | **** 辞書攻撃 [#wc1aaefa] |
+ | - pyrit -r pacp_file -i password_file [-e ESSID] attack_passthrough | ||
#br | #br | ||
- | - pryrit -r pcap_file attack_batch | + | |
+ | **** Brute-Force Attack [#cbd8c839] | ||
+ | - [[crunch]] 8 8 | pyrit -r pacp_file -i - [-e ESSID] attack_passthrough | ||
+ | - ワード生成プログラムに依存する | ||
#br | #br | ||
- | **** 辞書攻撃 [#wc1aaefa] | + | *** Demo [#sd6408ae] |
- | - pyrit -r pacp_file -i password_file -e ESSID attack_passthrough | + | |
#br | #br | ||
Line 28: | Line 37: | ||
- cd Pyrit | - cd Pyrit | ||
- ./setup.py build | - ./setup.py build | ||
- | - ./setup.pt install | + | - ./setup.py install |
#br | #br | ||
Line 36: | Line 45: | ||
- cd Pyrit | - cd Pyrit | ||
- ./setup.py build | - ./setup.py build | ||
- | - ./setup.pt install | + | - ./setup.py install |
#br | #br |
- Pyrit のバックアップ一覧
- Pyrit のバックアップの現在との差分(No. All)