Airbase-ng帮助

 Airbase-ng 1.2 rc2 - (C) 2008-2014 Thomas d'Otreppe
  Original work: Martin Beck
  http://www.aircrack-ng.org

  usage: airbase-ng <options> <replay interface>

  Options:

      -a bssid         : set Access Point MAC address             设置接入点MAC地址
      -i iface         : capture packets from this interface         从指定接口捕获数据包
      -w WEP key       : use this WEP key to en-/decrypt packets          使用WEP密码破解或者加密数据包
      -h MAC           : source mac for MITM mode           中间人模式的源MAC地址
      -f disallow      : disallow specified client MACs (default: allow)              过滤指定MAC地址
      -W 0|1           : [don't] set WEP flag in beacons 0|1 (default: auto)           设置WEP标志,默认自动
      -q               : quiet (do not print statistics)            静默模式不输出
      -v               : verbose (print more messages)          输出模式
      -A               : Ad-Hoc Mode (allows other clients to peer)
      -Y in|out|both   : external packet processing
      -c channel       : sets the channel the AP is running on 设置AP的运行信道
      -X               : hidden ESSID           隐藏ESSID
      -s               : force shared key authentication (default: auto)
      -S               : set shared key challenge length (default: 128)
      -L               : Caffe-Latte WEP attack (use if driver can't send frags)
      -N               : cfrag WEP attack (recommended)
      -x nbpps         : number of packets per second (default: 100)         设置频率
      -y               : disables responses to broadcast probes       忽略相应广播帧
      -0               : set all WPA,WEP,open tags. can't be used with -z & -Z                             设置所有WPA,WEP
      -z type          : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104         设置WPA1标志1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104
      -Z type          : same as -z, but for WPA2             和-z相同,只是设置WPA2的
      -V type          : fake EAPOL 1=MD5 2=SHA1 3=auto        伪造WAPOL1=MD5 2=SHA1 3=auto
      -F prefix        : write all sent and received frames into pcap file          将发送和接收的帧写入PCAP文件
      -P               : respond to all probes, even when specifying ESSIDs         回应所有探测帧
      -I interval      : sets the beacon interval value in ms
      -C seconds       : enables beaconing of probed ESSID values (requires -P)        设置时间,需要-P 结合使用

  Filter options:      过滤选项
      --bssid MAC      : BSSID to filter/use       过滤BSSID
      --bssids file    : read a list of BSSIDs out of that file        读取存储的BSSID文件
      --client MAC     : MAC of client to filter         过滤MAC地址
      --clients file   : read a list of MACs out of that file         读取MAC地址文件
      --essid ESSID    : specify a single ESSID (default: default)         指定单个ESSID
      --essids file    : read a list of ESSIDs out of that file            读取存储的ESSID文件

      --help           : Displays this usage screen

 

原文地址:https://www.cnblogs.com/nightnine/p/5427299.html