Comandos_WIFI
resumen en portada
root@kali:~# iwconfig usb0 no wireless extensions. lo no wireless extensions. wlan0 IEEE 802.11 ESSID:off/any Mode:Managed Access Point: Not-Associated Tx-Power=31 dBm Retry short limit:7 RTS thr:off Fragment thr:off Encryption key:off Power Management:on root@kali:~#
root@kali:~# iw reg get global country ES: DFS-ETSI (2400 - 2483 @ 40), (N/A, 20), (N/A) (5150 - 5250 @ 80), (N/A, 23), (N/A), NO-OUTDOOR, AUTO-BW (5250 - 5350 @ 80), (N/A, 20), (0 ms), NO-OUTDOOR, DFS, AUTO-BW (5470 - 5725 @ 160), (N/A, 26), (0 ms), DFS (57000 - 66000 @ 2160), (N/A, 40), (N/A) root@kali:~#
root@kali:~# iw wlan0 scan |grep SSID SSID: Portal WIFI BEC SSID: SSID: Portal WIFI BEC SSID: wifORG 5G SSID: Testing SSID: Encounter Prentsa SSID: EKT SSID: Opengune SSID: Portal WIFI BEC SSID:
root@kali:~# ifconfig wlan0 up root@kali:~# ifup wlan0 ifup: interface wlan0 already configured root@kali:~#
ifconfig wlan0 down iw reg set ES ifconfig wlan0 up iw reg get
wpa_cli -i wlan0 status
wpa_cli -i wlan0 scan
wpa_cli -i wlan0 scan_results
root@kali:~# wpa_cli -i wlan0 status wpa_state=DISCONNECTED p2p_device_address=0e:cb:86:43:56:45 address=46:d9:25:2c:6f:b9 uuid=61776eaa-cac5-5c4b-a913-c990c9bf6f0d root@kali:~# wpa_cli -i wlan0 scan FAIL-BUSY root@kali:~# wpa_cli -i wlan0 scan_results bssid / frequency / signal level / flags / ssid 18:d6:c7:85:89:e5 5180 -75 [WPA2-PSK-CCMP][WPS][ESS] HARDWARE 5.0 7a:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] wifORG 5G 8a:8a:20:b2:03:3f 5220 -71 [WPA2-EAP-CCMP][ESS] Testing aa:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] Encounter Prentsa 9a:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] EKT ba:8a:20:b2:03:3f 5220 -71 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] Opengune 78:8a:20:b2:03:3f 5220 -71 [WPA2-PSK-CCMP][ESS] EuskalAmiga - Rojo d8:84:66:c2:e0:82 5240 -76 [ESS] Portal WIFI BEC d8:84:66:c2:df:12 5180 -77 [ESS] Portal WIFI BEC d8:84:66:c2:e0:d2 5220 -77 [ESS] Portal WIFI BEC d8:84:66:c2:df:10 5180 -77 [ESS] d8:84:66:c2:e0:c0 5200 -79 [ESS] Portal WIFI BEC root@kali:~#
pi@raspberrypi:~ $ nmcli usb0: conectado to Conexión cableada 1 "MediaTek X30" ethernet (rndis_host), 11:22:33:44:55:66, hw, mtu 1500 ip4 default inet4 192.168.42.113/24 inet6 fe80::cb85:b943:1e9f:d119/64 wlan0: no disponible "Broadcom " wifi (brcmfmac), 92:F5:B5:11:22:33, hw, mtu 1500 lo: sin gestión loopback (unknown), 00:00:00:00:00:00, sw, mtu 65536 DNS configuration: servers: 192.168.42.129 interface: usb0 Use "nmcli device show" to get complete information about known devices and "nmcli connection show" to get an overview on active connection profiles. Consult nmcli(1) and nmcli-examples(5) manual pages for complete usage details. pi@raspberrypi:~ $
nmcli device s
o nmcli d s
pi@raspberrypi:~ $ nmcli device s DISPOSITIVO TIPO ESTADO CONEXIÓN usb0 ethernet conectado Conexión cableada 1 wlan0 wifi no disponible -- lo loopback sin gestión -- pi@raspberrypi:~ $___
`nmcli connection show` o `nmcli c`
pi@raspberrypi:~ $ nmcli connection show NOMBRE UUID TIPO DISPOSITIVO Conexión cableada 1 1c66b8a2-1ded-32b9-b4dc-010caf3cf65d 802-3-ethernet usb0 pi@raspberrypi:~ $ nmcli c NOMBRE UUID TIPO DISPOSITIVO Conexión cableada 1 1c66b8a2-1ded-32b9-b4dc-010caf3cf65d 802-3-ethernet usb0
root@kali:~# nmcli con up X30 & [1] 1112 root@kali:~# Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/4)
root@kali:~# nmcli device show GENERAL.DEVICE: usb0 GENERAL.TYPE: ethernet GENERAL.HWADDR: 5E:26:19:02:65:B1 GENERAL.MTU: 1500 GENERAL.STATE: 100 (connected) GENERAL.CONNECTION: Wired connection 1 GENERAL.CON-PATH: /org/freedesktop/NetworkManager/ActiveConnection/1 WIRED-PROPERTIES.CARRIER: on IP4.ADDRESS[1]: 192.168.42.117/24 IP4.GATEWAY: 192.168.42.129 IP4.ROUTE[1]: dst = 0.0.0.0/0, nh = 192.168.42.129, mt = 100 IP4.ROUTE[2]: dst = 192.168.42.0/24, nh = 0.0.0.0, mt = 100 IP4.DNS[1]: 192.168.42.129 IP6.ADDRESS[1]: fe80::2f79:af9a:6677:8f2a/64 IP6.GATEWAY: -- IP6.ROUTE[1]: dst = fe80::/64, nh = ::, mt = 100 IP6.ROUTE[2]: dst = ff00::/8, nh = ::, mt = 256, table=255 GENERAL.DEVICE: wlan0 GENERAL.TYPE: wifi GENERAL.HWADDR: 36:75:DB:01:FE:05 GENERAL.MTU: 1500 GENERAL.STATE: 30 (disconnected) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- GENERAL.DEVICE: p2p-dev-wlan0 GENERAL.TYPE: wifi-p2p GENERAL.HWADDR: (unknown) GENERAL.MTU: 0 GENERAL.STATE: 30 (disconnected) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- GENERAL.DEVICE: lo GENERAL.TYPE: loopback GENERAL.HWADDR: 00:00:00:00:00:00 GENERAL.MTU: 65536 GENERAL.STATE: 10 (unmanaged) GENERAL.CONNECTION: -- GENERAL.CON-PATH: -- IP4.ADDRESS[1]: 127.0.0.1/8 IP4.GATEWAY: -- IP6.ADDRESS[1]: ::1/128 IP6.GATEWAY: -- IP6.ROUTE[1]: dst = ::1/128, nh = ::, mt = 256
root@kali:~# airmon-ng PHY Interface Driver Chipset phy0 wlan0 brcmfmac Broadcom 43430
iwconfig wlan0 essid X30 key polkawifi
ifconfig wlan0 up
wpa_cli -i wlan0 scan
wpa_cli -i wlan0 scan_results
Modo Monitor
Three ways to set wireless interface to Monitor mode and Managed mode
ifconfig wlan0 down; iwconfig wlan0 mode monitor; ifconfig wlan0 up ; iwconfig
root@kali:~# ifconfig wlan0 down; iwconfig wlan0 mode monitor; ifconfig wlan0 up ; iwconfig lo no wireless extensions. wlan0 IEEE 802.11 Mode:Monitor Frequency:2.452 GHz Tx-Power=31 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on root@kali:~#
root@kali:~# scapy INFO: Can't import matplotlib. Won't be able to plot. INFO: Can't import PyX. Won't be able to use psdump() or pdfdump(). WARNING: No route found for IPv6 destination :: (no default route?) WARNING: IPython not available. Using standard Python shell instead. AutoCompletion, History are disabled. aSPY//YASa apyyyyCY//////////YCa | sY//////YSpcs scpCY//Pp | Welcome to Scapy ayp ayyyyyyySCP//Pp syY//C | Version 2.4.2 AYAsAYYYYYYYY///Ps cY//S | pCCCCY//p cSSps y//Y | https://github.com/secdev/scapy SPPPP///a pP///AC//Y | A//A cyP////C | Have fun! p///Ac sC///a | P////YCpc A//A | Wanna support scapy? Rate it on scccccp///pSP///p p//Y | sectools! sY/////////y caa S//P | http://sectools.org/tool/scapy/ cayCyayP//Ya pY/Ya | -- Satoshi Nakamoto sY/PsY////YCc aC//Yp | sc sccaCY//PCypaapyCP//YSs spCPY//////YPSps ccaacs >>> conf.iface = "wlan0" >>> >>> sniff(count=5,prn=lambda x: x.show()) ###[ Ethernet ]### dst= b8:27:eb:1e:f8:3a src= 38:ba:f8:63:26:53 type= 0x800 ###[ IP ]### version= 4 ihl= 5 tos= 0x10 len= 104 id= 35081 flags= DF frag= 0 ttl= 64 proto= tcp chksum= 0x2e15 src= 192.168.1.3 dst= 192.168.1.14 \options\ ###[ TCP ]### sport= 57754 dport= ssh seq= 2934275237L ack= 213819934 dataofs= 8 reserved= 0 flags= PA window= 372 chksum= 0x3eda urgptr= 0 options= [('NOP', None), ('NOP', None), ('Timestamp', (3024144634L, 3188922691L))] ###[ Raw ]### load= "\xbf\xe0\xda \x0b|\x1d/\x95\x08k\xaaZ<*<\xe7<\x94DU\xbcgW\x9e\xaa\xa8\xd2\rAr\x00`\xd8c\xcfzc\xd5\xb5\xc3G\xa7\x1d\xe5'\x04\x04!\xcb\xd0\xdc" ... ... ...