MacportsでAirCrack-ngをインストールする
MacportsでAirCrack-ngをインストールする
0.改訂履歴
1.はじめに
このドキュメントでは,aircrack-ngrをインストールする手順を説明する. aircrack-ngは,無線LANの古い暗号化プロトコルであるWEPのWEPキーを解析するツールである. インストールするのは,MacOS X 10.5.2へMacPorts 1.6の環境である.
2.モジュールを確認する.
- portのsearchコマンドで現在のバージョンを探す.
root# /opt/local/bin/port -d search aircrack
DEBUG: Found port in file:///opt/local/var/macports/sources/rsync.macports.org
/release/ports/security/aircrack-ng
aircrack-ng security/aircrack-ng 0.9.3 Aircrack-ng
is the next generation of aircrack with lots of new features
root#
|
- 現在の最新版である0.9.3が用意されている.
- 依存関係を調べる.
root# /opt/local/bin/port -d variants aircrack-ng
DEBUG: Found port in file:///opt/local/var/macports/sources/rsync.macports.org
/release/ports/security/aircrack-ng
DEBUG: Changing to port directory: /opt/local/var/macports/sources/rsync.
macports.org/release/ports/security/aircrack-ng
DEBUG: Requested variant darwin is not provided by port aircrack-ng.
DEBUG: Requested variant i386 is not provided by port aircrack-ng.
DEBUG: Requested variant macosx is not provided by port aircrack-ng.
aircrack-ng has the variants:
universal
root#
|
root# /opt/local/bin/port install aircrack-ng
---> Fetching aircrack-ng
---> Attempting to fetch aircrack-ng-0.9.3.tar.gz from http://download.aircrack-ng.org/
---> Verifying checksum(s) for aircrack-ng
---> Extracting aircrack-ng
---> Configuring aircrack-ng
---> Building aircrack-ng with target all
---> Staging aircrack-ng into destroot
---> Installing aircrack-ng 0.9.3_1
---> Activating aircrack-ng 0.9.3_1
---> Cleaning aircrack-ng
root#
|
root# ls -la /opt/local/bin/
total 872
drwxr-xr-x 12 root admin 408 5 24 19:38 .
drwxr-xr-x 11 root admin 374 5 24 19:15 ..
-rwxr-xr-x 2 root admin 128380 5 24 19:38 aircrack-ng
-rwxr-xr-x 2 root admin 54592 5 24 19:38 airdecap-ng
-r-xr-xr-x 1 root admin 73568 12 17 16:32 daemondo
-rwxr-xr-x 2 root admin 18232 5 24 19:38 ivstools
-rwxr-xr-x 2 root admin 17508 5 24 19:38 kstats
-rwxr-xr-x 2 root admin 37688 5 24 19:38 packetforge-ng
-r-xr-xr-x 1 root admin 83411 12 17 16:32 port
lrwxr-xr-x 1 root admin 4 5 24 19:15 portf -> port
-r-xr-xr-x 1 root admin 4356 12 17 16:32 portindex
-r-xr-xr-x 1 root admin 2530 12 17 16:32 portmirror
root#
|
- 2つのアプリケーションがインストールされている.
- それぞれ,次の通り.
- aircrack-ng
- airdecap-ng
- WEP/WPA/WPA2の通信をキャプチャしてダンプされたファイルを解析する
- コマンドのヘルプを確認すると,次の通り.
root# /opt/local/bin/aircrack-ng --help
Aircrack-ng 0.9.3 - (C) 2006,2007,2008 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
usage: aircrack-ng [options] <.cap / .ivs file(s)>
Common options:
-a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
-e <essid> : target selection: network identifier
-b <bssid> : target selection: access point's MAC
-p <nbcpu> : # of CPU to use (by default, all CPUs)
-q : enable quiet mode (no status output)
Static WEP cracking options:
-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d <mask> : debug - specify mask of the key (A1:XX:CF:YY)
-m <maddr> : MAC address to filter usable packets
-n <nbits> : WEP key length : 64/128/152/256/512
-i <index> : WEP key index (1 to 4), default: any
-f <fudge> : bruteforce fudge factor, default: 2
-k <korek> : disable one attack method (1 to 17)
-x or -x0 : disable last keybytes bruteforce
-x1 : enable last keybyte bruteforcing (default)
-x2 : enable last two keybytes bruteforcing
-X : disable bruteforce multithreading (SMP only)
-y : experimental single bruteforce mode
-z : PTW attack
-s : show ASCII version of the key
WEP and WPA-PSK cracking options:
-w <words> : path to a dictionary file (multiple
dictionnaries can be specified.
See manpage for more information)
--help : Displays this usage screen
root#
|
root# /opt/local/bin/airdecap-ng --help
Airdecap-ng 0.9.3 - (C) 2006,2007,2008 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
usage: airdecap-ng [options] <pcap file>
Common options:
-l : don't remove the 802.11 header
-b <bssid> : access point MAC address filter
-e <essid> : target network SSID
WEP specific option:
-w <key> : target network WEP key in hex
WPA specific options:
-p <pass> : target network WPA passphrase
-k <pmk> : WPA Pairwise Master Key in hex
--help : Displays this usage screen
root#
|
- これらのツールは,両方ともダンプされたファイルを解析する為のツールなので,キャプチャされたダンプファイルを入手しておく必要がある.
- 残念ながら,古い時代のAirMacカードじゃないとキャプチャできない模様.