7: 2020-01-15 (水) 16:21:44 iseki | 現: 2021-07-13 (火) 11:54:36 iseki | ||
---|---|---|---|
Line 2: | Line 2: | ||
- WPA/WPA2 用解析ソフト | - WPA/WPA2 用解析ソフト | ||
+ | - Python2 用 (2020 1/16 python3 未対応) | ||
- GPU使用可能 | - GPU使用可能 | ||
- https://github.com/JPaulMora/Pyrit | - https://github.com/JPaulMora/Pyrit | ||
Line 11: | Line 12: | ||
- pyrit -r pcap_file analyze | - pyrit -r pcap_file analyze | ||
#br | #br | ||
- | **** 解析用データベースの作成 [#f0f8f84a] | + | **** 解析用データベースを作成して攻撃 [#f0f8f84a] |
- | - pyrit -e ESSID create_essid | + | - pyrit -i /usr/share/wordlists/metasploit/password.lst import_passwords |
- | #br | + | - pyrit -r cap_file analyze |
- | **** データベースにパスワードを入力 [#g3e1bbc1] | + | - pyrit -e ESSID create_essid |
- | - pyrit -i password_file import_passwords | + | - pyrit batch |
- | #br | + | - pyrit -r cap_file attack_db |
- | - pryrit -r pcap_file attack_batch | + | |
#br | #br | ||
**** 辞書攻撃 [#wc1aaefa] | **** 辞書攻撃 [#wc1aaefa] | ||
- | - pyrit -r pacp_file -i password_file %%-e ESSID%% attack_passthrough | + | - pyrit -r pacp_file -i password_file [-e ESSID] attack_passthrough |
+ | #br | ||
+ | |||
+ | **** Brute-Force Attack [#cbd8c839] | ||
+ | - [[crunch]] 8 8 | pyrit -r pacp_file -i - [-e ESSID] attack_passthrough | ||
+ | - ワード生成プログラムに依存する | ||
#br | #br | ||
*** Demo [#sd6408ae] | *** Demo [#sd6408ae] | ||
+ | |||
+ | #br | ||
*** for CentOS [#t4f4438b] | *** for CentOS [#t4f4438b] | ||
Line 30: | Line 37: | ||
- cd Pyrit | - cd Pyrit | ||
- ./setup.py build | - ./setup.py build | ||
- | - ./setup.pt install | + | - ./setup.py install |
#br | #br | ||
Line 38: | Line 45: | ||
- cd Pyrit | - cd Pyrit | ||
- ./setup.py build | - ./setup.py build | ||
- | - ./setup.pt install | + | - ./setup.py install |
#br | #br |
- Pyrit のバックアップ一覧
- Pyrit のバックアップの現在との差分(No. All)