Kali-linux使用Easy-Creds工具攻擊無線網絡


Easy-Creds是一個菜單式的破解工具。該工具允許用戶打開一個無線網卡,並能實現一個無線接入點攻擊平台。Easy-Creds可以創建一個欺騙訪問點,並作為一個中間人攻擊類型運行,進而分析用戶的數據流和賬戶信息。它可以從SSL加密數據中恢復賬戶。本節將介紹使用Easy-Creds工具攻擊無線網絡。

Easy-Creds是BackTrack5中的一部分。在Kali中,默認沒有安裝該工具。所以,需要先安裝Easy-Creds工具才可使用。

【實例9-3】安裝Easy-Creds工具。具體操作步驟如下所示。

(1)從https://github.com/brav0hax/easy-creds網站下載Easy-Creds軟件包,其軟件包名為easy-creds-master.zip。

(2)解壓下載的軟件包。執行命令如下所示:

root@localhost:~# unzip easy-creds-master.zip
Archive: easy-creds-master.zip
bf9f00c08b1e26d8ff44ef27c7bcf59d3122ebcc
  creating: easy-creds-master/
 inflating: easy-creds-master/README
 inflating: easy-creds-master/definitions.sslstrip
 inflating: easy-creds-master/easy-creds.sh
 inflating: easy-creds-master/installer.sh

從輸出的信息中,可以看到Easy-Creds軟件包被解壓到easy-creds-master文件中。從以上信息中,可以看到在easy-creds-master文件中有一個installer.sh文件,該文件就是用來安裝Easy-Creds軟件包的。

(3)安裝Easy-Creds軟件包。在安裝Easy-Creds軟件包之前,有一些依賴包需要安裝。這些依賴包,可以參考easy-creds-master文件中的README文件安裝相關的依賴包。然后,安裝Easy-Creds包。執行命令如下所示:

root@kali:~# cd easy-creds/
root@kali:~/easy-creds# ./installer.sh
____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e|||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.7 - Garden of Your Mind
        Installer
Please choose your OS to install easy-creds
1\. Debian/Ubuntu and derivatives
2\. Red Hat or Fedora
3\. Microsoft Windows
4\. Exit
Choice:

以上信息顯示了,安裝easy-creds的操作系統菜單。

(4)這里選擇安裝到Debian/Ubuntu,輸入編號1,將顯示如下所示的信息:

Choice: 1
____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.7 - Garden of Your Mind
          Installer
Please provide the path you'd like to place the easy-creds folder. [/opt] :   #選擇安裝位置,本例中使用默認設置
[*] Installing pre-reqs for Debian/Ubuntu…
[*] Running 'updatedb'
[-] cmake is not installed, will attempt to install…
  [+] cmake was successfully installed from the repository.
[+] I found gcc installed on your system
[+] I found g++ installed on your system
[+] I found subversion installed on your system
[+] I found wget installed on your system
[+] I found libssl-dev installed on your system
[+] I found libpcap0.8 installed on your system
[+] I found libpcap0.8-dev installed on your system
[+] I found libssl-dev installed on your system
[+] I found aircrack-ng installed on your system
[+] I found xterm installed on your system
[+] I found sslstrip installed on your system
[+] I found ettercap installed on your system
[+] I found hamster installed on your system
[-] ferret is not installed, will attempt to install…
[*] Downloading and installing ferret from SVN
……
[*] Installing the patched freeradius server…
……
make[4]: Leaving directory `/tmp/ec-install/freeradius-server-2.1.11/doc/rfc'
make[3]: Leaving directory `/tmp/ec-install/freeradius-server-2.1.11/doc'
make[2]: Leaving directory `/tmp/ec-install/freeradius-server-2.1.11/doc'
make[1]: Leaving directory `/tmp/ec-install/freeradius-server-2.1.11'
[+] The patched freeradius server has been installed
[+] I found asleap installed on your system
[+] I found metasploit installed on your system
[*] Running 'updatedb' again because we installed some new stuff
…happy hunting!

以上信息顯示了安裝Easy-Creds包的詳細過程。在該過程中,會檢測easy-creds的依賴包是否都已安裝。如果沒有安裝,此過程中會安裝。Easy-Creds軟件包安裝完成后,將顯示happy hunting!信息。

【實例9-4】使用Easy-Creds工具破解無線網絡。具體操作步驟如下所示。

(1)啟動Easy-Creds工具。執行命令如下所示:

root@localhost:~/easy-creds-master#./easy-creds.sh
____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.8-dev - Garden of New Jersey
At any time, ctrl+c to cancel and return to the main menu
1\. Prerequisites & Configurations
2\. Poisoning Attacks
3\. FakeAP Attacks
4\. Data Review
5\. Exit
q. Quit current poisoning session
Choice:

以上輸出的信息顯示了Easy-Creds工具的攻擊菜單。

(2)這里選擇偽AP攻擊,輸入編號3。將顯示如下所示的信息:

Choice: 3
____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.8-dev - Garden of New Jersey
At any time, ctrl+c to cancel and return to the main menu
1\. FakeAP Attack Static
2\. FakeAP Attack EvilTwin
3\. Karmetasploit Attack
4\. FreeRadius Attack
5\. DoS AP Options
6\. Previous Menu
Choice:

以上輸出信息顯示了偽AP攻擊可使用的方法。

(3)這里選擇使用靜態偽AP攻擊,輸入編號1。將顯示如下所示的信息:

設置完以上的信息后,將會自動啟動一些程序。幾秒后,將會打開幾個有效窗口,如圖9.34所示。

圖9.34 有效的窗口

(4)當有用戶連接Wifi接入點時,Easy-Creds將自動給客戶端分配一個IP地址,並且能夠訪問互聯網。如果在互聯網上訪問一個安全網址時,該工具將除去SSL並刪除安全連接並在后台運行。所以,能夠讀取到客戶端登錄某個網站的用戶名和密碼。如圖9.34所示,捕獲到一個登錄http://www.live.com網站的用戶名和密碼。其用戶名為test@live.com,密碼為qwert。

(5)此時在Easy-Creds的主菜單中選擇數據恢復,輸入編號4,如下所示:

At any time, ctrl+c to cancel and return to the main menu
1\. Prerequisites & Configurations
2\. Poisoning Attacks
3\. FakeAP Attacks
4\. Data Review
5\. Exit
q. Quit current poisoning session
Choice: 4

(6)選擇數據恢復后,將顯示如下所示的信息:

____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.8-dev - Garden of New Jersey
At any time, ctrl+c to cancel and return to the main menu
1\. Parse SSLStrip log for credentials
2\. Parse dsniff file for credentials
3\. Parse ettercap eci file for credentials
4\. Parse freeradius attack file for credentials
5\. Previous Menu
Choice: 3

以上信息顯示了可用證書的方法。

(7)這里選擇分析Ettercap eci文件,輸入編號3,將顯示如下所示的信息:

||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 Version 3.8-dev - Garden of New Jersey
At any time, ctrl+c to cancel and return to the main menu
Ettercap logs in current log folder:
/root/easy-creds-master/easy-creds-2014-07-24-1722/ettercap2014-07-24-1724.eci
Enter the full path to your ettercap.eci log file:

從輸出信息中,可以看到Ettercap日志文件的保存位置。

(8)此時輸入ettercap.eci日志文件的全路徑。這里只需要通過復制並粘貼提供的整個Ettercap路徑就可以了。如下所示:

Enter the full path to your ettercap.eci log file: /root/easy-creds-master/easy-creds-2014-07-24-1722/ettercap2014-07-24-1724.eci

輸入以下路徑后,將顯示如圖9.35所示的界面。

圖9.35 恢復的數據

(9)從該界面可以清楚的看到,截獲的客戶端用戶信息及登錄的網站。


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM