WEP的密钥Spoonwep为脚本,以显示在ASCII

发布者:管理员在3日第9次, 2009年

FreeBSD的是不是在这个故事是一个很少注意的WEP测试Linux系统的脆弱性我想放弃。

Aircrack -吴亮是一个高概率迟早IKENAKAっ没有增加了不止一个控制台中,欠KEMASU是聪明?
当门前示威的客户, “看来我不能给任何人。 ”
我被清理,因此,它不能提高安全意识, Spoonwep尝试了GUI应用程序。

Aircrack吴需要一段时间相比,美国模式开关是好的,因为它是处理一个完全自动的搜索和分析PAKETTOKYAPUCHA 。
令人遗憾的是,这一进程的最后分析( aircrack -纳克)的结果是选择,因为它是十六进制。
 [ XX:XX:XX:XX:XX:XX ] 
转换为一个聪明的,简单的Perl脚本安排出版。

hex-asc.pl
 #!/usr/bin/perl

## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## WEP-KEY BIN Viewer for Spoonwep
## (ASCII to BINARY Changer for Spoonwep / Spoonwep2)
##
##           http://freebsd.ai-line.com/  by sio (Japan)
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

## How to use. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#  1.Permission change to 0700.
#  2.When Spoonwep is finished, this running.
#  3.Executes this.
#  4.After that, Please give me a mail(sio<at>ai-line.com).
#    Girl or Japanese limitation ;-)
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

## configure
$output_dir
= '/root/Desktop/CrackedWEP';

## Spoonwep default setting
$lastattack_dir
= '/usr/local/bin/wifispoonfeeder/spoonwep/lastattack';
$key_file
= 'key.txt';
$essid_file
= 'wscapture-01.txt';

## wepkey
$readfile
= "$lastattack_dir/$key_file";
open
(IN, $readfile);
  $wepkey
= <IN>;
close
(IN);
$wepkey
=~ s/\[|\]|\ |\:|\n//g;  # [ ww:xx:yy:zz ] => wwxxyyzz
$wepkey
=~ s/([a-fA-F0-9][a-fA-F0-9])/pack("H2",$1)/eg; # ASCII to BINARY

## essid
$readfile
= "$lastattack_dir/$essid_file";
open
(IN, $readfile);
  @essid
= <IN>;
close
(IN);
$essid
= $essid[2];
@essid
= split(/,/, $essid);
$essid
= $essid[13];
$essid
=~ s/^\s*//;
$essid
=~ s/\s*$//;

## Write
($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = localtime(time);
$year
+= 1900;
$mon
+= 1;
$filename
= "$year$mon$mday$hour$min$sec";
unless (-d $output_dir) {
  mkdir $output_dir
;
}
open
(FILE, "> $output_dir/$filename");
 
print FILE "ESSID  = $essid\n";
 
print FILE "WEPKEY = $wepkey";
close
(FILE);