WEP的密钥Spoonwep为脚本,以显示在ASCII

发布者:管理员在3日第9次, 2009年

FreeBSD的是不是在这个故事是一个很少注意的WEP测试Linux系统的脆弱性我想放弃。

Aircrack -吴亮是一个高概率迟早IKENAKAっ没有增加了不止一个控制台中,欠KEMASU是聪明?
当门前示威的客户, “看来我不能给任何人。 ”
我被清理,因此,它不能提高安全意识, Spoonwep尝试了GUI应用程序。

Aircrack吴需要一段时间相比,美国模式开关是好的,因为它是处理一个完全自动的搜索和分析PAKETTOKYAPUCHA 。
令人遗憾的是,这一进程的最后分析( aircrack -纳克)的结果是选择,因为它是十六进制。
 [ XX:XX:XX:XX:XX:XX ] 
转换为一个聪明的,简单的Perl脚本安排出版。

hex-asc.pl
 #!/usr/bin/perl

## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## WEP-KEY BIN Viewer for Spoonwep
## (ASCII to BINARY Changer for Spoonwep / Spoonwep2)
##
##           http://freebsd.ai-line.com/  by sio (Japan)
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

## How to use. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#  1.Permission change to 0700.
#  2.When Spoonwep is finished, this running.
#  3.Executes this.
#  4.After that, Please give me a mail(sio<at>ai-line.com).
#    Girl or Japanese limitation ;-)
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

## configure
$output_dir = '/root/Desktop/CrackedWEP';

## Spoonwep default setting
$lastattack_dir = '/usr/local/bin/wifispoonfeeder/spoonwep/lastattack';
$key_file = 'key.txt';
$essid_file = 'wscapture-01.txt';

## wepkey
$readfile = "$lastattack_dir/$key_file";
open(IN, $readfile);
  $wepkey = <IN>;
close(IN);
$wepkey =~ s/\[|\]|\ |\:|\n//g;  # [ ww:xx:yy:zz ] => wwxxyyzz
$wepkey =~ s/([a-fA-F0-9][a-fA-F0-9])/pack("H2",$1)/eg; # ASCII to BINARY

## essid
$readfile = "$lastattack_dir/$essid_file";
open(IN, $readfile);
  @essid = <IN>;
close(IN);
$essid = $essid[2];
@essid = split(/,/, $essid);
$essid = $essid[13];
$essid =~ s/^\s*//;
$essid =~ s/\s*$//;

## Write
($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = localtime(time);
$year += 1900;
$mon += 1;
$filename = "$year$mon$mday$hour$min$sec";
unless (-d $output_dir) {
  mkdir $output_dir;
}
open(FILE, "> $output_dir/$filename");
  print FILE "ESSID  = $essid\n";
  print FILE "WEPKEY = $wepkey";
close (FILE);