KaliLinux无线网络设置[bak]


在使用网络查看命令(ifconfig/iwconfig)可以查看到无线网卡的情况下(表明无线网卡的驱动是正常安装的,之后就可以使用命令:iwlist wlan0 scanning 来查看附近的一些无线信号)

编辑文件“/etc/network/interfaces”:

# vim /etc/network/interfaces
——————-

# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

# The loopback network interface
auto lo
iface lo inet loopback

auto wlan0
iface wlan0 inet static
address 192.168.1.111
gateway 192.168.1.1
netmask 255.255.255.0
wpa-ssid Your_SSID
wpa-psk Your_passwd

——————-
然后重启网卡就行:service networking restart。

记录一下。。。
2014-5-8 14:52:10

然后可以手动指定一下DNS防止运营商的DNS污染:
编辑Debian下的DNS服务器配置文件: /etc/resolv.conf

nameserver 202.103.0.117
nameserver 211.95.193.97
nameserver 114.114.114.114
nameserver 8.8.8.8

, ,

《 “KaliLinux无线网络设置[bak]” 》 有 7 条评论

  1. https://www.offensive-security.com/kali-linux/kali-linux-evil-wireless-access-point/

    一个创建虚假AP以嗅探数据的Python程序
    https://github.com/xdavidhu/mitmAP

    GitHub搜索:
    access point
    ap

    一个用于创建基于 NAT或Bridge 的Wifi接入点的脚本(This script creates a NATed or Bridged WiFi Access Point.)
    https://github.com/oblique/create_ap

    专业的Wifi爆破框架
    https://github.com/P0cL4bs/WiFi-Pumpkin

    Man-In-The-Middle 攻击框架
    https://github.com/byt3bl33d3r/MITMf

  2. 无线审计,入侵检测与预防系统(Wireless Auditing, Intrusion Detection & Prevention System)
    https://github.com/SYWorks/waidps

    通过嗅探无线数据包来检测诸如(WEP/WPA/WPS)攻击的可疑活动
    Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
    https://github.com/SYWorks/wireless-ids

    在不需要客户端的情况下攻击WPA加密的无线接入点
    https://github.com/SYWorks/wpa-bruteforcer

    收集设备的SSID信息
    https://github.com/SYWorks/wifi-harvester

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注