View Single Post
Hva er neste?
ranvik's Avatar
Trådstarter
oky da hadde jeg litt bedre tid:
helpen sier:
root@OpenWrt:~# aircrack-ng

Aircrack-ng 0.5 - (C) 2006 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org

usage: aircrack-ng [options] <.cap / .ivs file(s)>

Common options:

-a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
-e <essid> : target selection: network identifier
-b <bssid> : target selection: access point's MAC
-q : enable quiet mode (no status output)

Static WEP cracking options:

-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d <start> : debug - specify beginning of the key
-m <maddr> : MAC address to filter usable packets
-n <nbits> : WEP key length : 64/128/152/256/512
-i <index> : WEP key index (1 to 4), default: any
-f <fudge> : bruteforce fudge factor, default: 2
-k <korek> : disable one attack method (1 to 17)
-x : disable two last keybytes bruteforce
-y : experimental single bruteforce mode

WPA-PSK cracking options:

-w <words> : path to a dictionary file

root@OpenWrt:~# aircrack-ng

skriv da : aircrack-ng -n 64 filnavnHER.ivs
da kjøre den på 64bits, skriver du 128 så går den på 128bits.
skal du teste for ALLE mulig kombinasjoner så kan du bruke
aircrack-ng -n64 -w passwordlista filnabne.ivs
skal du legge filer og hente ut ting, last ned :winscp installer den og når du logger på velg "ssh" så får du opp samme type som notron commander veldig enkelt liksom.