zoukankan      html  css  js  c++  java
  • Airbase-ng帮助

     Airbase-ng 1.2 rc2 - (C) 2008-2014 Thomas d'Otreppe
      Original work: Martin Beck
      http://www.aircrack-ng.org

      usage: airbase-ng <options> <replay interface>

      Options:

          -a bssid         : set Access Point MAC address             设置接入点MAC地址
          -i iface         : capture packets from this interface         从指定接口捕获数据包
          -w WEP key       : use this WEP key to en-/decrypt packets          使用WEP密码破解或者加密数据包
          -h MAC           : source mac for MITM mode           中间人模式的源MAC地址
          -f disallow      : disallow specified client MACs (default: allow)              过滤指定MAC地址
          -W 0|1           : [don't] set WEP flag in beacons 0|1 (default: auto)           设置WEP标志,默认自动
          -q               : quiet (do not print statistics)            静默模式不输出
          -v               : verbose (print more messages)          输出模式
          -A               : Ad-Hoc Mode (allows other clients to peer)
          -Y in|out|both   : external packet processing
          -c channel       : sets the channel the AP is running on 设置AP的运行信道
          -X               : hidden ESSID           隐藏ESSID
          -s               : force shared key authentication (default: auto)
          -S               : set shared key challenge length (default: 128)
          -L               : Caffe-Latte WEP attack (use if driver can't send frags)
          -N               : cfrag WEP attack (recommended)
          -x nbpps         : number of packets per second (default: 100)         设置频率
          -y               : disables responses to broadcast probes       忽略相应广播帧
          -0               : set all WPA,WEP,open tags. can't be used with -z & -Z                             设置所有WPA,WEP
          -z type          : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104         设置WPA1标志1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104
          -Z type          : same as -z, but for WPA2             和-z相同,只是设置WPA2的
          -V type          : fake EAPOL 1=MD5 2=SHA1 3=auto        伪造WAPOL1=MD5 2=SHA1 3=auto
          -F prefix        : write all sent and received frames into pcap file          将发送和接收的帧写入PCAP文件
          -P               : respond to all probes, even when specifying ESSIDs         回应所有探测帧
          -I interval      : sets the beacon interval value in ms
          -C seconds       : enables beaconing of probed ESSID values (requires -P)        设置时间,需要-P 结合使用

      Filter options:      过滤选项
          --bssid MAC      : BSSID to filter/use       过滤BSSID
          --bssids file    : read a list of BSSIDs out of that file        读取存储的BSSID文件
          --client MAC     : MAC of client to filter         过滤MAC地址
          --clients file   : read a list of MACs out of that file         读取MAC地址文件
          --essid ESSID    : specify a single ESSID (default: default)         指定单个ESSID
          --essids file    : read a list of ESSIDs out of that file            读取存储的ESSID文件

          --help           : Displays this usage screen

     

  • 相关阅读:
    二叉树中序遍历的非递归实现
    求树的遍历、树的叶子节点个数、树的高度、copy树
    javascript知识点汇总(running)
    IOS零碎知识点(积累中)
    Cuda learn record three
    Cuda learn record two
    找出字符串中的最长的回文子串
    Cuda learn record one
    Chrome 安装失败 错误代码 0X80070057
    Vs 2015 项目中include 无法打开源文件
  • 原文地址:https://www.cnblogs.com/nightnine/p/5427299.html
Copyright © 2011-2022 走看看