aircrack-ng抓包
optional rename interface name: echo ‘SUBSYSTEM==“net”, ACTION==“add”, DRIVERS=="?*", ATTR{address}==“02:01:02:03:04:05”, ATTR{dev_id}==“0x0”, ATTR{type}==“1”, NAME=“wlx0”'|sudo tee -a /etc/udev/rules.d/70-persistent-net.rules 安装 sudo apt install aircrack-ng start monitor mode sudo airmon-ng start wlx0 [channel] #在信道channel上监听(mon0),不指定信道全监听但不能用于aireplay sudo airodump-ng mon0 # 监听所有ESS sudo airodum-ng mon0 -c 1 –bssid bssid #监听ESS下的station,得到mac sudo aireplay-ng -0 1000 -a 7E:F7:E6:C8:0B:E7 -c BC:83:85:EE:35:AB mon0 # 在mon0的信道上进行解关联解认证攻击 start……