{"id":3880,"date":"2014-08-09T22:15:45","date_gmt":"2014-08-09T20:15:45","guid":{"rendered":"http:\/\/blog.wenzlaff.de\/?p=3880"},"modified":"2021-11-22T17:15:18","modified_gmt":"2021-11-22T16:15:18","slug":"wie-kann-aircrack-ng-1-2-beta-3-auf-einem-raspberry-pi-b-installiert-werden","status":"publish","type":"post","link":"http:\/\/blog.wenzlaff.de\/?p=3880","title":{"rendered":"Wie kann aircrack-ng 1.2 Beta 3 auf einem Raspberry Pi B+ installiert werden?"},"content":{"rendered":"<p>Um Schwachstellen im WLAN zu finden, kann ldt. <a href=\"https:\/\/de.wikipedia.org\/wiki\/Aircrack\" title=\"wikipedia-aircrack\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia<\/a> das Tool <a href=\"http:\/\/www.aircrack-ng.org\/\" title=\"aircrack\" target=\"_blank\" rel=\"noopener noreferrer\">aircrack-ng.org<\/a> verwendet werden. Dazu f\u00fcr den \u00dcberblick mal eine Mindmap: <a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/IMG_0720.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/IMG_0720.jpg\" alt=\"aircrack\" width=\"2000\" height=\"1331\" class=\"aligncenter size-full wp-image-3889\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/IMG_0720.jpg 2000w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/IMG_0720-300x199.jpg 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/IMG_0720-1024x681.jpg 1024w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a> Wie kann aircrack nun auf dem rPi installiert und an <strong>eigenen<\/strong> System getestet werden?<!--more--><\/p>\n<p># System aktualisieren<br \/>\n<code>sudo apt-get update<br \/>\nsudo apt-get upgrade<\/code><\/p>\n<p># n\u00f6tige Abh\u00e4ngigkeiten und zus\u00e4tzliche Tools installieren<br \/>\n<code>sudo apt-get install iw sysfsutils libssl-dev kismet libnl-3-dev libnl-3-doc libnl-genl-3-dev libnl1 libssl-dev wireless-tools tshark<\/code><\/p>\n<p># aircrack in aktueller Version holen<br \/>\n<code>wget http:\/\/download.aircrack-ng.org\/aircrack-ng-1.2-beta3.tar.gz<\/code><br \/>\n# Archive auspacken<br \/>\n<code>sudo tar xvfz aircrack-ng-1.2-beta3.tar.gz<\/code><br \/>\n# in das Verzeichnis wechseln<br \/>\n<code>cd aircrack-ng-1.2-beta3\/<\/code><br \/>\n# compilieren<br \/>\n<code>sudo make<\/code><br \/>\n# installieren<br \/>\n<code>sudo make install<\/code><br \/>\n# auf neuesten stand updaten<br \/>\n<code>sudo airodump-ng-oui-update<\/code><\/p>\n<p># check ob wlan0 ok<br \/>\n<code>iwconfig<\/code><br \/>\n# check<br \/>\n<code>sudo airmon-ng check<\/code><br \/>\n# Erg. z.B.<code><br \/>\nFound 7 processes that could cause trouble.<br \/>\nIf airodump-ng, aireplay-ng or airtun-ng stops working after<br \/>\na short period of time, you may want to kill (some of) them!<br \/>\n-e<br \/>\nPID\tName<br \/>\n1672\tifplugd<br \/>\n1701\tifplugd<br \/>\n1712\tifplugd<br \/>\n3616\twpa_supplicant<br \/>\n3695\twpa_cli<br \/>\n3809\tdhclient<br \/>\n3856\tdhclient<br \/>\nProcess with PID 1712 (ifplugd) is running on interface wlan0<br \/>\nProcess with PID 3616 (wpa_supplicant) is running on interface wlan0<br \/>\nProcess with PID 3695 (wpa_cli) is running on interface wlan0<br \/>\nProcess with PID 3809 (dhclient) is running on interface wlan0<br \/>\nProcess with PID 3856 (dhclient) is running on interface wlan0<br \/>\n<\/code><br \/>\n# wenn wlan0 Processe vorhanden sind in \/etc\/network\/interfaces alle Verweise auf <strong>wlan0<\/strong> auskommentieren<br \/>\n# z.B.:<br \/>\n# allow-hotplug wlan0<br \/>\n# iface wlan0 inet manual<br \/>\n# wpa-roam \/etc\/wpa_supplicant\/wpa_supplicant.conf<br \/>\n# iface default inet dhcp<br \/>\n#<br \/>\n# Zugang nicht \u00fcber WLAN sondern \u00fcber LAN Buchse<\/p>\n<p># airmon-ng starten, erzeugt <strong>mon0<\/strong><br \/>\n<code>sudo <strong>airmon-ng<\/strong> start wlan0<\/code><br \/>\nAusgabe:<a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.12.36.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.12.36.png\" alt=\"Bildschirmfoto 2014-08-09 um 22.12.36\" width=\"889\" height=\"87\" class=\"aligncenter size-full wp-image-3909\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.12.36.png 889w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.12.36-300x29.png 300w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/p>\n<p># wieder check ob wlan0 vorhanden und im Mode: <strong>Monitor<\/strong><br \/>\n<code>iwconfig wlan0<\/code><br \/>\n# Ausgabe:<a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.10.57.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.10.57.png\" alt=\"Bildschirmfoto 2014-08-09 um 22.10.57\" width=\"870\" height=\"89\" class=\"aligncenter size-full wp-image-3907\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.10.57.png 870w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.10.57-300x30.png 300w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/p>\n<p># Wenn Mode nicht Monitor, wlan0 runterfahren<br \/>\n<code>ifconfig wlan0 down<\/code><br \/>\n# manuel in Monitor Modus setzen<br \/>\n<code>iwconfig wlan0 mode monitor<\/code><br \/>\n# wieder aktivieren<br \/>\n<code>ifconfig wlan0 up<\/code><br \/>\n# wieder checken<br \/>\n<code>iwconfig wlan0<\/code><br \/>\n# ok, Monitor Modus<\/p>\n<p># Starten eines Scan auf alle WLAN Accesspoints inkl. ihrer BSSIDs<br \/>\n# und alle mit diesen APs assoziierten WLAN Clients an im gesamten WLAN Band mit<br \/>\n<code>sudo <strong>airodump-ng<\/strong> wlan0<\/code><br \/>\nEs wird dann eine Tabelle in folgender Form ausgegeben:<br \/>\n<a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.57.44.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.57.44.png\" alt=\"Bildschirmfoto 2014-08-09 um 21.57.44\" width=\"929\" height=\"143\" class=\"aligncenter size-full wp-image-3901\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.57.44.png 929w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.57.44-300x46.png 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.57.44-900x138.png 900w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.58.00.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.58.00.png\" alt=\"Bildschirmfoto 2014-08-09 um 21.58.00\" width=\"932\" height=\"63\" class=\"aligncenter size-full wp-image-3899\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.58.00.png 932w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.58.00-300x20.png 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-21.58.00-900x60.png 900w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/p>\n<p># oder unverschl\u00fcsselten Accesspoint aufspannen f\u00fcr Clients auf Kanal 7<br \/>\n<code>sudo airbase-ng -e \"Kostenloses WLAN\" -c 7 mon0<\/code><br \/>\nStartet dann mit:<br \/>\n<a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.01.39.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.01.39.png\" alt=\"Bildschirmfoto 2014-08-09 um 22.01.39\" width=\"687\" height=\"85\" class=\"aligncenter size-full wp-image-3904\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.01.39.png 687w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.01.39-300x37.png 300w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/a> und wenn sich &#8222;jemand&#8220; einloggt:<br \/>\n<a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48.png\" alt=\"Bildschirmfoto 2014-08-09 um 22.04.48\" width=\"982\" height=\"31\" class=\"aligncenter size-full wp-image-3905\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48.png 982w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48-300x9.png 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48-940x31.png 940w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2014\/08\/Bildschirmfoto-2014-08-09-um-22.04.48-900x28.png 900w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Um Schwachstellen im WLAN zu finden, kann ldt. Wikipedia das Tool aircrack-ng.org verwendet werden. Dazu f\u00fcr den \u00dcberblick mal eine Mindmap: Wie kann aircrack nun auf dem rPi installiert und an eigenen System getestet werden?<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[220,808,1023,1319,7],"tags":[1615,1610,1609,1613,511,513,1614,1612,1611],"class_list":["post-3880","post","type-post","status-publish","format-standard","hentry","category-anleitung","category-linux-2","category-raspberry-pi","category-sicherheit-2","category-tools","tag-accesspoint-aufspannen","tag-aircrack","tag-aircrack-ng","tag-bssid-ermitteln","tag-scann","tag-wlan","tag-wlan-clients","tag-wlan-scan","tag-wlan0"],"_links":{"self":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/3880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3880"}],"version-history":[{"count":0,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/3880\/revisions"}],"wp:attachment":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3880"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}