MacportsでAirCrack-ngをインストールする
		
		
				MacportsでAirCrack-ngをインストールする
		
		0.改訂履歴
		
1.はじめに
		 このドキュメントでは,aircrack-ngrをインストールする手順を説明する. aircrack-ngは,無線LANの古い暗号化プロトコルであるWEPのWEPキーを解析するツールである. インストールするのは,MacOS X 10.5.2へMacPorts 1.6の環境である.
		2.モジュールを確認する.
		
			- portのsearchコマンドで現在のバージョンを探す.
		
			
				
					| root# /opt/local/bin/port -d search aircrack
DEBUG: Found port in file:///opt/local/var/macports/sources/rsync.macports.org
/release/ports/security/aircrack-ng
aircrack-ng                    security/aircrack-ng 0.9.3        Aircrack-ng 
is the next generation of aircrack with lots of new features
root# | 
			
		 
		
			- 現在の最新版である0.9.3が用意されている.
			
- 依存関係を調べる.
		
			
				
					| root# /opt/local/bin/port -d variants aircrack-ng
DEBUG: Found port in file:///opt/local/var/macports/sources/rsync.macports.org
/release/ports/security/aircrack-ng
DEBUG: Changing to port directory: /opt/local/var/macports/sources/rsync.
macports.org/release/ports/security/aircrack-ng
DEBUG: Requested variant darwin is not provided by port aircrack-ng.
DEBUG: Requested variant i386 is not provided by port aircrack-ng.
DEBUG: Requested variant macosx is not provided by port aircrack-ng.
aircrack-ng has the variants:
	universal
root# | 
			
		 
		
		
			
				
					| root# /opt/local/bin/port install aircrack-ng
--->  Fetching aircrack-ng
--->  Attempting to fetch aircrack-ng-0.9.3.tar.gz from http://download.aircrack-ng.org/
--->  Verifying checksum(s) for aircrack-ng
--->  Extracting aircrack-ng
--->  Configuring aircrack-ng
--->  Building aircrack-ng with target all
--->  Staging aircrack-ng into destroot
--->  Installing aircrack-ng 0.9.3_1
--->  Activating aircrack-ng 0.9.3_1
--->  Cleaning aircrack-ng
root#  | 
			
		 
		
		
			
				
					| root# ls -la /opt/local/bin/
total 872
drwxr-xr-x  12 root  admin     408  5 24 19:38 .
drwxr-xr-x  11 root  admin     374  5 24 19:15 ..
-rwxr-xr-x   2 root  admin  128380  5 24 19:38 aircrack-ng
-rwxr-xr-x   2 root  admin   54592  5 24 19:38 airdecap-ng
-r-xr-xr-x   1 root  admin   73568 12 17 16:32 daemondo
-rwxr-xr-x   2 root  admin   18232  5 24 19:38 ivstools
-rwxr-xr-x   2 root  admin   17508  5 24 19:38 kstats
-rwxr-xr-x   2 root  admin   37688  5 24 19:38 packetforge-ng
-r-xr-xr-x   1 root  admin   83411 12 17 16:32 port
lrwxr-xr-x   1 root  admin       4  5 24 19:15 portf -> port
-r-xr-xr-x   1 root  admin    4356 12 17 16:32 portindex
-r-xr-xr-x   1 root  admin    2530 12 17 16:32 portmirror
root# 
 | 
			
		 
		
			- 2つのアプリケーションがインストールされている.
			
- それぞれ,次の通り.
			
				- aircrack-ng
				
				
- airdecap-ng
				
					- WEP/WPA/WPA2の通信をキャプチャしてダンプされたファイルを解析する
				
 
 
- コマンドのヘルプを確認すると,次の通り.
		
			
				
					| root# /opt/local/bin/aircrack-ng --help
  Aircrack-ng 0.9.3 - (C) 2006,2007,2008 Thomas d'Otreppe
  Original work: Christophe Devine
  http://www.aircrack-ng.org
  usage: aircrack-ng [options] <.cap / .ivs file(s)>
  Common options:
      -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
      -e <essid> : target selection: network identifier
      -b <bssid> : target selection: access point's MAC
      -p <nbcpu> : # of CPU to use (by default, all CPUs)
      -q         : enable quiet mode (no status output)
  Static WEP cracking options:
      -c         : search alpha-numeric characters only
      -t         : search binary coded decimal chr only
      -h         : search the numeric key for Fritz!BOX
      -d <mask>  : debug - specify mask of the key (A1:XX:CF:YY)
      -m <maddr> : MAC address to filter usable packets
      -n <nbits> : WEP key length :  64/128/152/256/512
      -i <index> : WEP key index (1 to 4), default: any
      -f <fudge> : bruteforce fudge factor,  default: 2
      -k <korek> : disable one attack method  (1 to 17)
      -x or -x0  : disable last keybytes bruteforce
      -x1        : enable last keybyte bruteforcing (default)
      -x2        : enable last two keybytes bruteforcing
      -X         : disable bruteforce multithreading (SMP only)
      -y         : experimental single bruteforce mode
      -z         : PTW attack
      -s         : show ASCII version of the key
  WEP and WPA-PSK cracking options:
      -w <words> : path to a dictionary file (multiple
                    dictionnaries can be specified.
                    See manpage for more information)
      --help     : Displays this usage screen
root# 
 | 
			
		 
		
		
			
				
					| root# /opt/local/bin/airdecap-ng --help
  Airdecap-ng 0.9.3 - (C) 2006,2007,2008 Thomas d'Otreppe
  Original work: Christophe Devine
  http://www.aircrack-ng.org
  usage: airdecap-ng [options] <pcap file>
  Common options:
      -l         : don't remove the 802.11 header
      -b <bssid> : access point MAC address filter
      -e <essid> : target network SSID
  WEP specific option:
      -w <key>   : target network WEP key in hex
  WPA specific options:
      -p <pass>  : target network WPA passphrase
      -k <pmk>   : WPA Pairwise Master Key in hex
      --help     : Displays this usage screen
root# 
 | 
			
		 
		
			- これらのツールは,両方ともダンプされたファイルを解析する為のツールなので,キャプチャされたダンプファイルを入手しておく必要がある.
			
- 残念ながら,古い時代のAirMacカードじゃないとキャプチャできない模様.