macOS使用aircrack-ng测试

声明:本教程只为测试WiFi安全性,请勿用于非法用途,本教程演示的环境皆为笔者自家WiFi

Step1:安装aircrack-ng

终端输入命令(前提是电脑已经安装brew):

brew install aircrack-ng

终端输出:

==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/pcre-8.44.b
######################################################################## 100.0%
==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/aircrack-ng
######################################################################## 100.0%
==> Installing dependencies for aircrack-ng: pcre
==> Installing aircrack-ng dependency: pcre
==> Pouring pcre-8.44.big_sur.bottle.tar.gz
  /usr/local/Cellar/pcre/8.44: 204 files, 5.8MB
==> Installing aircrack-ng
==> Pouring aircrack-ng-1.6.big_sur.bottle.tar.gz
==> Caveats
Run `airodump-ng-oui-update` install or update the Airodump-ng OUI file.
==> Summary
  /usr/local/Cellar/aircrack-ng/1.6: 112 files, 3MB
==> Caveats
==> aircrack-ng
Run `airodump-ng-oui-update` install or update the Airodump-ng OUI file.

Step2:添加airport快链

ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport

Step3:查看附件的WiFi信息
终端内输入airport -s命令,就能看到 airport 监测到的附近 wifi 信息:

airport -s

终端输出 :

                            SSID BSSID             RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
                          taotao c8:5b:a0:00:45:42 -65  10,-1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                   ChinaNet-EgEN 44:ff:ba:b6:8d:48 -57  8       Y  CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
                          oracle 88:c3:97:c3:7a:16 -41  6       Y  CN WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)
                    TP-LINK_ABE4 74:05:a5:41:ab:e4 -71  6,-1    Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                             302 24:69:68:ab:4b:ae -84  1,+1    Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    TP-LINK_D33E 8c:a6:df:e2:d3:3e -74  1,+1    Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                       taotao-5G c8:5b:a0:00:45:44 -79  157     Y  CN WPA(PSK/AES/AES) WPA2(PSK,FT-PSK/AES/AES)
               360WiFi-B1D5EB-5G 2c:61:04:b1:d5:ed -92  149     Y  CN WPA(PSK/AES/AES) WPA2(PSK,FT-PSK/AES/AES)
                          oracle 88:c3:97:c3:7a:17 -49  44      Y  CN WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)

说明:

  • SSID:wifi名称,
  • RSSI:信号强度,
  • CHANNEL:信道

Step4:抓包

airport -I

你可能感兴趣的:(macOS使用aircrack-ng测试)