声明:本教程只为测试WiFi安全性,请勿用于非法用途,本教程演示的环境皆为笔者自家WiFi
Step1:安装aircrack-ng
终端输入命令(前提是电脑已经安装brew):
brew install aircrack-ng
终端输出:
==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/pcre-8.44.b
######################################################################## 100.0%
==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/aircrack-ng
######################################################################## 100.0%
==> Installing dependencies for aircrack-ng: pcre
==> Installing aircrack-ng dependency: pcre
==> Pouring pcre-8.44.big_sur.bottle.tar.gz
🍺 /usr/local/Cellar/pcre/8.44: 204 files, 5.8MB
==> Installing aircrack-ng
==> Pouring aircrack-ng-1.6.big_sur.bottle.tar.gz
==> Caveats
Run `airodump-ng-oui-update` install or update the Airodump-ng OUI file.
==> Summary
🍺 /usr/local/Cellar/aircrack-ng/1.6: 112 files, 3MB
==> Caveats
==> aircrack-ng
Run `airodump-ng-oui-update` install or update the Airodump-ng OUI file.
Step2:添加airport快链
ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
Step3:查看附件的WiFi信息
终端内输入airport -s
命令,就能看到 airport 监测到的附近 wifi 信息:
airport -s
终端输出 :
SSID BSSID RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
taotao c8:5b:a0:00:45:42 -65 10,-1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ChinaNet-EgEN 44:ff:ba:b6:8d:48 -57 8 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
oracle 88:c3:97:c3:7a:16 -41 6 Y CN WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)
TP-LINK_ABE4 74:05:a5:41:ab:e4 -71 6,-1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
302 24:69:68:ab:4b:ae -84 1,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
TP-LINK_D33E 8c:a6:df:e2:d3:3e -74 1,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
taotao-5G c8:5b:a0:00:45:44 -79 157 Y CN WPA(PSK/AES/AES) WPA2(PSK,FT-PSK/AES/AES)
360WiFi-B1D5EB-5G 2c:61:04:b1:d5:ed -92 149 Y CN WPA(PSK/AES/AES) WPA2(PSK,FT-PSK/AES/AES)
oracle 88:c3:97:c3:7a:17 -49 44 Y CN WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)
说明:
- SSID:wifi名称,
- RSSI:信号强度,
- CHANNEL:信道
Step4:抓包
airport -I