mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-10-01 01:25:43 -04:00
65 lines
2.7 KiB
Plaintext
65 lines
2.7 KiB
Plaintext
|
# Enable WPA. Setting this variable configures the AP to require WPA (either
|
||
|
# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
|
||
|
# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
|
||
|
# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
|
||
|
# RADIUS authentication server must be configured, and WPA-EAP must be included
|
||
|
# in wpa_key_mgmt.
|
||
|
# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)
|
||
|
# and/or WPA2 (full IEEE 802.11i/RSN):
|
||
|
# bit0 = WPA
|
||
|
# bit1 = IEEE 802.11i/RSN (WPA2)
|
||
|
wpa=1
|
||
|
interface=wlan0
|
||
|
ssid=corp-net
|
||
|
hw_mode=g
|
||
|
channel=11
|
||
|
logger_syslog=-1
|
||
|
logger_syslog_level=2
|
||
|
driver=nl80211
|
||
|
|
||
|
|
||
|
# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
|
||
|
# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase
|
||
|
# (8..63 characters) that will be converted to PSK. This conversion uses SSID
|
||
|
# so the PSK changes when ASCII passphrase is used and the SSID is changed.
|
||
|
#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
|
||
|
wpa_passphrase=omarsucks
|
||
|
|
||
|
# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
|
||
|
# entries are separated with a space.
|
||
|
wpa_key_mgmt=WPA-PSK WPA-EAP
|
||
|
|
||
|
# Set of accepted cipher suites (encryption algorithms) for pairwise keys
|
||
|
# (unicast packets). This is a space separated list of algorithms:
|
||
|
# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
|
||
|
# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i]
|
||
|
# Group cipher suite (encryption algorithm for broadcast and multicast frames)
|
||
|
# is automatically selected based on this configuration. If only CCMP is
|
||
|
# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
|
||
|
# TKIP will be used as the group cipher.
|
||
|
#wpa_pairwise=TKIP CCMP
|
||
|
|
||
|
# Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
||
|
# seconds.
|
||
|
wpa_group_rekey=600
|
||
|
|
||
|
# Time interval for rekeying GMK (master key used internally to generate GTKs
|
||
|
# (in seconds).
|
||
|
wpa_gmk_rekey=86400
|
||
|
|
||
|
# Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
|
||
|
# roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
|
||
|
# authentication and key handshake before actually associating with a new AP.
|
||
|
#rsn_preauth=1
|
||
|
#
|
||
|
# Space separated list of interfaces from which pre-authentication frames are
|
||
|
# accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
|
||
|
# interface that are used for connections to other APs. This could include
|
||
|
# wired interfaces and WDS links. The normal wireless data interface towards
|
||
|
# associated stations (e.g., wlan0) should not be added, since
|
||
|
# pre-authentication is only used with APs other than the currently associated
|
||
|
# one.
|
||
|
#rsn_preauth_interfaces=eth0
|
||
|
#
|
||
|
##CC=ccache gcc
|