每当我尝试在终端中安装时,aircrack-ng
都会出现以下错误:
Package aircrack-ng is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
However the following packages replace it:
iw
E: Package 'aircrack-ng' has no installation candidate"
我是 Ubuntu 新手,所以不知道该做什么。
答案1
正如消息所述,它已从 ubuntu 存储库中删除。您可以按照以下步骤安装它
sudo apt-get install build-essential
sudo apt-get install libssl-dev
wget http://download.aircrack-ng.org/aircrack-ng-1.1.tar.gz
tar -zxvf aircrack-ng-1.1.tar.gz
cd aircrack-ng-1.1
在 aircrack-ng-1.1 目录中有一个名为 common.mak 的文件,使用您最喜欢的编辑器打开该文件并向下滚动直到看到以下行:
CFLAGS ?= -g -W -Wall -Werror -O3
删除-Werror
变量,使该行现在如下所示。保存并退出。
CFLAGS ?= -g -W -Wall -O3
在终端中运行make
并启动并运行。”sudo make install
aircrack-ng
转到build-essential
更新管理器>设置> ubuntu 软件并查看是否选中了顶部主页。
答案2
我有 PPA 用于精确。我是为了另一个问题才这么做的。如果你需要添加 PPA 的说明,可以访问这里。
答案3
答案4
Debian 软件包可从此处获取:http://ubuntu2.cica.es/ubuntu/ubuntu/pool/universe/a/aircrack-ng/
您需要下载相应的包体系结构
wget http://ubuntu2.cica.es/ubuntu/ubuntu/pool/universe/a/aircrack-ng/aircrack-ng_1.1-6_amd64.deb
dpkg -i aircrack-ng_1.1-6_amd64.deb
这是帮助命令
root@chillax:/usr/local/src# aircrack-ng --help
Aircrack-ng 1.1 - (C) 2006, 2007, 2008, 2009 Thomas d'Otreppe Original work: Christophe Devine http://www.aircrack-ng.org
usage: aircrack-ng [options] <.cap / .ivs file(s)>
Common options:
-a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
-e <essid> : target selection: network identifier
-b <bssid> : target selection: access point's MAC
-p <nbcpu> : # of CPU to use (default: all CPUs)
-q : enable quiet mode (no status output)
-C <macs> : merge the given APs to a virtual one
-l <file> : write key to file
Static WEP cracking options:
-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d <mask> : use masking of the key (A1:XX:CF:YY)
-m <maddr> : MAC address to filter usable packets
-n <nbits> : WEP key length : 64/128/152/256/512
-i <index> : WEP key index (1 to 4), default: any
-f <fudge> : bruteforce fudge factor, default: 2
-k <korek> : disable one attack method (1 to 17)
-x or -x0 : disable bruteforce for last keybytes
-x1 : last keybyte bruteforcing (default)
-x2 : enable last 2 keybytes bruteforcing
-X : disable bruteforce multithreading
-y : experimental single bruteforce mode
-K : use only old KoreK attacks (pre-PTW)
-s : show the key in ASCII while cracking
-M <num> : specify maximum number of IVs to use
-D : WEP decloak, skips broken keystreams
-P <num> : PTW debug: 1: disable Klein, 2: PTW
-1 : run only 1 try to crack key with PTW
WEP and WPA-PSK cracking options:
-w <words> : path to wordlist(s) filename(s)
-r <DB> : path to airolib-ng database
(Cannot be used with -w)
--help : Displays this usage screen