⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wepdecrypt.1

📁 About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o
💻 1
字号:
.TH WEPDECRYPT 1 "3 July 2006".SH NAME wepdecrypt \-  decrypt wep keys.SH SYNOPSIS.B wepdecrypt -f .I dumpfile.B [-s].B [-w.I wordfile.B ] [-m.I mode.B ] [-b.I mac_address.B ] [-i.I key.B ] [-e.I key.B ] [-d.I mode.B ] [-n.I network.B ] [-c.I server:port.B ] [-g] [-l.I num_blocks.B ].B [-?|-h].SH DESCRIPTIONWepdecrypt is a Wireless LAN Tool for Linux which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack andsome other methods. Millions of words can be checked out. Wepdecrypt it's based on wepattack by Dominik Blunk and Alain Girardet..SH OPTIONS.TP.B -f dumpfileNetwork dumpfile to read in PCAP format (as TCPDUMP, ETHEREAL or KISMET uses).TP.B -s	Server mode, it's used to use wepdecrypt as a server daemon to manage a distributednetwork attack (doesn't work in windows).TP.B -w wordfileTake keys from a file to perform a dicctionary attack (not valid with 64 or 128 mode).TP.B -b mac_addressFilter an address from the dump file this is done to decrypt only the keys from oneaccess point (referenced by mac), if the provided ap mac isn't found the program willtry to decrypt all networks found in dumpfile.TP.B -m modeSpecifies the decrypting mode (default all) values:  64, 128, n64, n128, nall.TP.B -i KeyThis option is for the internal key generator (used with 64 or 128 mode) it specifiesthe start key, can also be used in server mode.TP.B -e KeyThis option is for the internal key generator (used with 64 or 128 mode) it specifiesthe last key.TP.B -c server:portClient mode, server is the host where wepdecrypt is running in server mode and port it's the number port where the server is listening.TP.B -n networkNetwork is a number and specifies the maximum number of keys to decrypt by default wepdecrypt will try to decrypt all packets with diferent keys found.TP.B -d mode Mode can be all, alpha, alphanumeric, numeric, random or printable this option is usedto set the mode for the new key generator. For example "-m 64 -d numeric" will try keys from "00000" to "99999".TP.B -gUsed with client mode to get the file to decrypt from the server.TP.B -l num_blocksUsed with client mode to set the number blocks to decrypt if num_blocks is 0 theclient will decrypt blocks while server has blocks to assign.TP.B -vShows current version.TP.B -?|-hShows help menu.SH FILES.TP.B /etc/wepdecryptThis file has some config settings to use wepdecrypt_inc and wepdecrypt_word.TP.B wepdecrypt_incThis is a shell script to use wepdecrypt with john in incremental mode .TP.B wepdecrypt_wordThis is a shell script to use wepdecrypt with john in word mode.TP.B $HOME/.wepdecryptThis file is to set some conf values for the server and the graphic interface such as port, server logverbosity and some others.TP .B /var/tmp/wepdecrypt_s.logThis is the file to log server activity.TPIn the windows version all files should be in the same directory as wepdecrypt..SH GWEPDECRYPTThis is the graphic interface for wepdecrypt. The gui is pretty self explanatory, every input box has a flag name, just change it with your desired values and hit the check button next to the input box, besides now, there is a new help option in the help menu (can also be accessed pressing "Ctrl+h") that explains every option. To start wepdecrypt press the start button. The default directory for wepdecrypt output logs is /tmp/ (in windows version is the same directory in which gwepdecrypt is running) it can be changed through the gui or $HOME/.wepdecrypt file..SH NOTESKeys must be in 00:00:00:00:00 format each field is a byte from the key (range is 00-FF)..B 64 bits keys needs 5 fields.B 128 bits keys needs 13 fieldsNow wordfile can contain hex keys which will be used as keys. To use this feature the first line of the word file should be HEXKEY_FILE.The max value for Block size is 1099511627775.SH EXAMPLESwepdecrypt -s -f local.dump -m 64& (runs wepdecrypt in server mode)wepdecrypt -f local.dump -m 64 -i 00:00:00:00:00 -e FF:FF:FF:FF:FF:FF (runs wepdecrypt with internal key generator)wepdecrypt -c example.com:3657 -g (gets the file to decrypt from the server)wepdecrypt -f local.dump -c example.com:3657 -l 0 (get blocks from the server until all keys have been decrypted)wepdecrypt -f local.dump -m 64 -d numeric (uses the new code generator)wepdecrtpt -f local.dump -m 128 -d all (uses the new code generator)gwepdecrypt (runs the wepdecrypt's graphic interface).SH SEE ALSO.BR wkeygen (1).SH BUGSReport any bug to <icemanf@gmail.com> .TPor.TP<http://wepdecrypt.sourceforge.net/forum/>.SH AUTHOR.B Fernando Tarin <icemanf@gmail.com>.TP.B http://wepdecrypt.sourceforge.net/

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -