Comandos_WIFI
resumen en portada
root@kali:~# iwconfig
usb0 no wireless extensions.
lo no wireless extensions.
wlan0 IEEE 802.11 ESSID:off/any
Mode:Managed Access Point: Not-Associated Tx-Power=31 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:on
root@kali:~#
root@kali:~# iw reg get
global
country ES: DFS-ETSI
(2400 - 2483 @ 40), (N/A, 20), (N/A)
(5150 - 5250 @ 80), (N/A, 23), (N/A), NO-OUTDOOR, AUTO-BW
(5250 - 5350 @ 80), (N/A, 20), (0 ms), NO-OUTDOOR, DFS, AUTO-BW
(5470 - 5725 @ 160), (N/A, 26), (0 ms), DFS
(57000 - 66000 @ 2160), (N/A, 40), (N/A)
root@kali:~#
root@kali:~# iw wlan0 scan |grep SSID
SSID: Portal WIFI BEC
SSID:
SSID: Portal WIFI BEC
SSID: wifORG 5G
SSID: Testing
SSID: Encounter Prentsa
SSID: EKT
SSID: Opengune
SSID: Portal WIFI BEC
SSID:
root@kali:~# ifconfig wlan0 up root@kali:~# ifup wlan0 ifup: interface wlan0 already configured root@kali:~#
ifconfig wlan0 down iw reg set ES ifconfig wlan0 up iw reg get
wpa_cli -i wlan0 status
wpa_cli -i wlan0 scan
wpa_cli -i wlan0 scan_results
root@kali:~# wpa_cli -i wlan0 status wpa_state=DISCONNECTED p2p_device_address=0e:cb:86:43:56:45 address=46:d9:25:2c:6f:b9 uuid=61776eaa-cac5-5c4b-a913-c990c9bf6f0d root@kali:~# wpa_cli -i wlan0 scan FAIL-BUSY root@kali:~# wpa_cli -i wlan0 scan_results bssid / frequency / signal level / flags / ssid 18:d6:c7:85:89:e5 5180 -75 [WPA2-PSK-CCMP][WPS][ESS] HARDWARE 5.0 7a:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] wifORG 5G 8a:8a:20:b2:03:3f 5220 -71 [WPA2-EAP-CCMP][ESS] Testing aa:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] Encounter Prentsa 9a:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] EKT ba:8a:20:b2:03:3f 5220 -71 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] Opengune 78:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] EuskalAmiga - Rojo d8:84:66:c2:e0:82 5240 -76 [ESS] Portal WIFI BEC d8:84:66:c2:df:12 5180 -77 [ESS] Portal WIFI BEC d8:84:66:c2:e0:d2 5220 -77 [ESS] Portal WIFI BEC d8:84:66:c2:df:10 5180 -77 [ESS] d8:84:66:c2:e0:c0 5200 -79 [ESS] Portal WIFI BEC root@kali:~#
pi@raspberrypi:~ $ nmcli
usb0: conectado to Conexión cableada 1
"MediaTek X30"
ethernet (rndis_host), 11:22:33:44:55:66, hw, mtu 1500
ip4 default
inet4 192.168.42.113/24
inet6 fe80::cb85:b943:1e9f:d119/64
wlan0: no disponible
"Broadcom "
wifi (brcmfmac), 92:F5:B5:11:22:33, hw, mtu 1500
lo: sin gestión
loopback (unknown), 00:00:00:00:00:00, sw, mtu 65536
DNS configuration:
servers: 192.168.42.129
interface: usb0
Use "nmcli device show" to get complete information about known devices and
"nmcli connection show" to get an overview on active connection profiles.
Consult nmcli(1) and nmcli-examples(5) manual pages for complete usage details.
pi@raspberrypi:~ $
nmcli device s o nmcli d s
pi@raspberrypi:~ $ nmcli device s DISPOSITIVO TIPO ESTADO CONEXIÓN usb0 ethernet conectado Conexión cableada 1 wlan0 wifi no disponible -- lo loopback sin gestión -- pi@raspberrypi:~ $___
`nmcli connection show` o `nmcli c`
pi@raspberrypi:~ $ nmcli connection show NOMBRE UUID TIPO DISPOSITIVO Conexión cableada 1 1c66b8a2-1ded-32b9-b4dc-010caf3cf65d 802-3-ethernet usb0 pi@raspberrypi:~ $ nmcli c NOMBRE UUID TIPO DISPOSITIVO Conexión cableada 1 1c66b8a2-1ded-32b9-b4dc-010caf3cf65d 802-3-ethernet usb0
root@kali:~# nmcli con up X30 & [1] 1112 root@kali:~# Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/4)
root@kali:~# nmcli device show GENERAL.DEVICE: usb0 GENERAL.TYPE: ethernet GENERAL.HWADDR: 5E:26:19:02:65:B1 GENERAL.MTU: 1500 GENERAL.STATE: 100 (connected) GENERAL.CONNECTION: Wired connection 1 GENERAL.CON-PATH: /org/freedesktop/NetworkManager/ActiveConnection/1 WIRED-PROPERTIES.CARRIER: on IP4.ADDRESS[1]: 192.168.42.117/24 IP4.GATEWAY: 192.168.42.129 IP4.ROUTE[1]: dst = 0.0.0.0/0, nh = 192.168.42.129, mt = 100 IP4.ROUTE[2]: dst = 192.168.42.0/24, nh = 0.0.0.0, mt = 100 IP4.DNS[1]: 192.168.42.129 IP6.ADDRESS[1]: fe80::2f79:af9a:6677:8f2a/64 IP6.GATEWAY: -- IP6.ROUTE[1]: dst = fe80::/64, nh = ::, mt = 100 IP6.ROUTE[2]: dst = ff00::/8, nh = ::, mt = 256, table=255 GENERAL.DEVICE: wlan0 GENERAL.TYPE: wifi GENERAL.HWADDR: 36:75:DB:01:FE:05 GENERAL.MTU: 1500 GENERAL.STATE: 30 (disconnected) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- GENERAL.DEVICE: p2p-dev-wlan0 GENERAL.TYPE: wifi-p2p GENERAL.HWADDR: (unknown) GENERAL.MTU: 0 GENERAL.STATE: 30 (disconnected) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- GENERAL.DEVICE: lo GENERAL.TYPE: loopback GENERAL.HWADDR: 00:00:00:00:00:00 GENERAL.MTU: 65536 GENERAL.STATE: 10 (unmanaged) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- IP4.ADDRESS[1]: 127.0.0.1/8 IP4.GATEWAY: -- IP6.ADDRESS[1]: ::1/128 IP6.GATEWAY: -- IP6.ROUTE[1]: dst = ::1/128, nh = ::, mt = 256
root@kali:~# airmon-ng PHY Interface Driver Chipset phy0 wlan0 brcmfmac Broadcom 43430
iwconfig wlan0 essid X30 key polkawifi
ifconfig wlan0 up
wpa_cli -i wlan0 scan
wpa_cli -i wlan0 scan_results
Modo Monitor
Three ways to set wireless interface to Monitor mode and Managed mode
ifconfig wlan0 down; iwconfig wlan0 mode monitor; ifconfig wlan0 up ; iwconfig
root@kali:~# ifconfig wlan0 down; iwconfig wlan0 mode monitor; ifconfig wlan0 up ; iwconfig
lo no wireless extensions.
wlan0 IEEE 802.11 Mode:Monitor Frequency:2.452 GHz Tx-Power=31 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on
root@kali:~#
root@kali:~# scapy
INFO: Can't import matplotlib. Won't be able to plot.
INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
WARNING: IPython not available. Using standard Python shell instead.
AutoCompletion, History are disabled.
aSPY//YASa
apyyyyCY//////////YCa |
sY//////YSpcs scpCY//Pp | Welcome to Scapy
ayp ayyyyyyySCP//Pp syY//C | Version 2.4.2
AYAsAYYYYYYYY///Ps cY//S |
pCCCCY//p cSSps y//Y | https://github.com/secdev/scapy
SPPPP///a pP///AC//Y |
A//A cyP////C | Have fun!
p///Ac sC///a |
P////YCpc A//A | Wanna support scapy? Rate it on
scccccp///pSP///p p//Y | sectools!
sY/////////y caa S//P | http://sectools.org/tool/scapy/
cayCyayP//Ya pY/Ya | -- Satoshi Nakamoto
sY/PsY////YCc aC//Yp |
sc sccaCY//PCypaapyCP//YSs
spCPY//////YPSps
ccaacs
>>> conf.iface = "wlan0"
>>>
>>> sniff(count=5,prn=lambda x: x.show())
###[ Ethernet ]###
dst= b8:27:eb:1e:f8:3a
src= 38:ba:f8:63:26:53
type= 0x800
###[ IP ]###
version= 4
ihl= 5
tos= 0x10
len= 104
id= 35081
flags= DF
frag= 0
ttl= 64
proto= tcp
chksum= 0x2e15
src= 192.168.1.3
dst= 192.168.1.14
\options\
###[ TCP ]###
sport= 57754
dport= ssh
seq= 2934275237L
ack= 213819934
dataofs= 8
reserved= 0
flags= PA
window= 372
chksum= 0x3eda
urgptr= 0
options= [('NOP', None), ('NOP', None), ('Timestamp', (3024144634L, 3188922691L))]
###[ Raw ]###
load= "\xbf\xe0\xda \x0b|\x1d/\x95\x08k\xaaZ<*<\xe7<\x94DU\xbcgW\x9e\xaa\xa8\xd2\rAr\x00`\xd8c\xcfzc\xd5\xb5\xc3G\xa7\x1d\xe5'\x04\x04!\xcb\xd0\xdc"
...
...
...