WIFI的ADB命令積累
1.status 檢視當前的WIFI狀態
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 status
bssid=70:62:b8:62:2e:c4 // 一個長度為48位二進位制的數字標誌,用於識別不同的BSS(Basic Service Set)基本服務集,主要用於過濾
freq=2412(1) 2417(2) 2422(3) 2427(4) 2432(5) 2437(6) 2442(7) 2447(8) 2452(9) 2457(10) 2462(11) 2467(12) 2472(13) //與熱點連線的通道
ssid=cts //當前連線的熱點AP的名稱
id=2 // 當前熱點AP記錄下STA的編號
mode=station // 當前裝置的工作模式為STA
pairwise_cipher=CCMP 【NONE】//表示當前熱點AP接受的安全加密演算法 CCMP表示的是 密碼塊訊息完整性協議
group_cipher=TKIP 【CCMP NONE】 //group_cipher 表示當前熱點AP接受的安全加密演算法 TKIP 表示的是 臨時密碼完整性協議
key_mgmt=WPA2-PSK 【NONE】 //認證金鑰管理協議
wpa_state=COMPLETED 【SCANNING DISCONNECTED】//STA的連線狀態
ip_address=192.168.235.18 //熱點分配給STA的IP地址(任意分配)
p2p_device_address=5e:a8:6a:e5:cb:cd // 當前裝置作為 WIFI直連時的MAC地址? 是STA的MAC地址加了2 從5e->5c 其後數字一樣?
address=5c:a8:6a:e5:cb:cd //STA的MAC地址
uuid=6885e701-c4a3-51c9-bd4d-98b0a5204df2 //全通通用唯一裝置識別符號 固定
2.terminate 立即關閉 wpa_supplicant // 關閉WIFI
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 terminate
3.list_networks 連線過的WIFI
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 list_networks
network id / ssid / bssid / flags
0 and-Business any
1 CMCC-WEB any
2 cts any
3 MYA-L03_虧哦UK大酒店 any
4 HUAWEI_MYA_3afb any [CURRENT]
4.select_network 設定連線到熱點 nitid對應的熱點 先斷開連線的熱點 再去連線netid
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 select_network 2
5.disable_network 斷開與熱點的連線 斷開後又會預設連線上
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 disable_network 5
6.signal_poll get signal parameters
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 signal_poll
RSSI=-23
LINKSPEED=65
NOISE=9999
FREQUENCY=2442
7.pktcnt_poll get TX/RX packet counters
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 pktcnt_poll
TXGOOD=1146
TXBAD=1
RXGOOD=0
8. DRIVER MACADDR 獲得MAC地址
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 DRIVER MACADDR
Macaddr = 5c:a8:6a:e5:cb:cd
9.reassociate 重連線
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reassociate
10.reattach 重連線當前已連線的WIFI
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reattach
11.ifname 檢視當前使用的網絡卡
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 ifname
wlan0
12.interface 當前可用介面
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 interface
Available interfaces:
p2p0
wlan0
13.ping 檢測Supplicant是否正常
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 ping
PONG
14.add_network 儲存一個網路(引數未知)
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 add_network XXXX
15.remove_network
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 remove_network 6
16.disconnect 段開當前連線
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 disconnect
17.reconnect 再次連線 如果已經連線則不執行
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reconnect
18.scan 啟動掃描
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan
19.scan_results 得到最新的掃描結果
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan_results
bssid / frequency / signal level / flags / ssid
70:62:b8:62:2e:c4 2412 -68 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS] cts
02:08:22:76:b5:73 2417 -24 [WPA2-PSK-CCMP][WPS][ESS] Lenovo S1La40
06:19:70:27:ca:96 2462 -54 [WPA2-EAP-CCMP-preauth][ESS] CMCC
00:23:69:ce:58:b0 2412 -62 [WPA-PSK-TKIP][ESS] LJ-7W1-V3-Linksys
06:19:70:00:32:c0 2472 -61 [WPA2-EAP-CCMP-preauth][ESS] CMCC
00:22:aa:9e:31:48 2452 -71 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] BW-wx20s
b8:e8:56:48:0e:ea 2462 -85 [WPA2-PSK-CCMP][ESS] KuriMBP
00:19:70:27:ca:96 2462 -55 [ESS] CMCC-WEB
16:19:70:27:ca:96 2462 -53 [ESS] and-Business
16:19:70:00:32:c0 2472 -60 [ESS] and-Business
16:19:70:00:30:2e 2437 -74 [ESS] and-Business
00:19:70:00:32:c0 2472 -60 [ESS] CMCC-WEB
02:08:22:da:90:11 2417 -25 [WPS][ESS] HUAWEI_MYA_3afb
06:19:70:00:30:2e 2437 -65 [WPA2-EAP-CCMP-preauth][ESS] CMCC
00:19:70:00:30:2e 2437 -73 [ESS] CMCC-WEB
44:6d:57:99:38:a1 2412 -78 [WPA2-PSK-CCMP][ESS] whr360
02:08:22:c6:74:1a 2437 -75 [WPA2-PSK-CCMP][WPS][ESS] AAA5860
00:19:70:00:30:d6 2412 -78 [ESS] CMCC-WEB
06:19:70:00:30:d6 2412 -78 [WPA2-EAP-CCMP-preauth][ESS] CMCC
06:19:70:00:30:88 2472 -82 [WPA2-EAP-CCMP-preauth][ESS] CMCC
16:19:70:00:30:88 2472 -80 [ESS] and-Business
12:0e:0e:20:63:b7 2437 -78 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] VIP-guest
16:19:70:00:30:d6 2412 -78 [ESS] and-Business
10:0e:0e:20:64:ca 2462 -86 [ESS] HQ_guest
00:23:69:ce:58:1d 2437 -81 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] LJ-Meeting 01
00:22:aa:9e:31:24 2412 -91 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] BW-wx20s
00:19:70:00:30:88 2472 -82 [ESS] CMCC-WEB
22:0e:0e:20:63:b7 2437 -83 [ESS] HQ_Office
20.bss 檢視熱點詳情
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss 70:62:b8:62:2e:c4
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss cts
id=0
bssid=70:62:b8:62:2e:c4 //BSSID 唯一標誌集合
freq=2412 //通道
beacon_int=100 //beacon幀間隔 用於通知AP的狀態
capabilities=0x0411 網路接入效能
qual=0
noise=-89 //噪音程度 數值越大 噪音越大
level=-63 //訊號程度 數值越大 訊號越大
tsf=0000519432862866 //時間同步
age=11
ie=0003637473010882848b962430486c0301012a01042f010430180100000fac020200000fac040
00fac020100000fac020c0032040c1218602d1aff1917ffffff00010000000000000000000000000
000000000003d16010d16000000000000000000000000000000000000007f080000000000000040d
d870050f204104a0001101044000102103b000103104700101e88f48914be85b618487062b8622ec
710210006442d4c696e6b1023000d442d4c696e6b20526f75746572102400084449522d3836384c1
042000830303030303030301054000800060050f2040001101100084449522d3836384c100800022
78c103c0001011049000600372a000120dd090010180206001c0000dd1a0050f20101000050f2020
2000050f2040050f20201000050f202dd180050f2020101840003a4000027a4000042435e0062322
f00
flags=[WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]
ssid=cts
wps_state=configured
wps_primary_device_type=6-0050F204-1
wps_device_name=DIR-868L
wps_config_methods=0x278c
snr=26 //訊號噪聲比 越大越好 【 level - noise 】 -63-(-89) = 26
est_throughput=135000 bps WIFI吞吐量
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss 02:08:22:da:90:11
ss 02:08:22:da:90:11
id=98
bssid=02:08:22:da:90:11
freq=2417
beacon_int=100
capabilities=0x0421
qual=0
noise=-89
level=-30
tsf=0000519432863304
age=64
ie=000f4855415745495f4d59415f33616662010882848b960c12182403010232043048606c2a010
02d1a300103ff000000000000000000000001000000000000000000003d160200010000000000000
00000000000000000000000007f0100dd180050f2020101800003a4000027a4000042435e0062322
f00dd180050f204104a00011010440001021049000600372a000120
flags=[WPS][ESS]
ssid=HUAWEI_MYA_3afb
wps_state=configured
snr=59 【 level - noise】 -30-(-89) = 59
est_throughput=65000 bps WIFI吞吐量
21.get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability eap
MD5 TLS WFA-UNAUTH-TLS MSCHAPV2 PEAP TTLS GTC OTP SIM LEAP AKA AKA' FAST WSC PWD
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability pairwise
CCMP TKIP
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability group
CCMP TKIP WEP104 WEP40
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability key_mgmt
NONE IEEE8021X WPA-EAP WPA-PSK
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability proto
RSN WPA
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability auth_alg
OPEN SHARED LEAP
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability channels
Mode[G] Channels: 1 2 3 4 5 6 7 8 9 10 11 12 13
Mode[A] Channels: 36 40 44 48 52 56 60 64 149 153 157 161 165
Mode[B] Channels: 1 2 3 4 5 6 7 8 9 10 11 12 13
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability freq
Mode[G] Channels:
1 = 2412 MHz
2 = 2417 MHz
3 = 2422 MHz
4 = 2427 MHz
5 = 2432 MHz
6 = 2437 MHz
7 = 2442 MHz
8 = 2447 MHz
9 = 2452 MHz
10 = 2457 MHz
11 = 2462 MHz
12 = 2467 MHz
13 = 2472 MHz
Mode[A] Channels:
36 = 5180 MHz
40 = 5200 MHz
44 = 5220 MHz
48 = 5240 MHz
52 = 5260 MHz
56 = 5280 MHz
60 = 5300 MHz
64 = 5320 MHz
149 = 5745 MHz
153 = 5765 MHz
157 = 5785 MHz
161 = 5805 MHz
165 = 5825 MHz
Mode[B] Channels:
1 = 2412 MHz
2 = 2417 MHz
3 = 2422 MHz
4 = 2427 MHz
5 = 2432 MHz
6 = 2437 MHz
7 = 2442 MHz
8 = 2447 MHz
9 = 2452 MHz
10 = 2457 MHz
11 = 2462 MHz
12 = 2467 MHz
13 = 2472 MHz
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability modes
IBSS
22.relog
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 relog
OK
23.mib
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 mib (Manager Info Base)基礎資料庫
dot11RSNAOptionImplemented=TRUE
dot11RSNAPreauthenticationImplemented=TRUE
dot11RSNAEnabled=FALSE
dot11RSNAPreauthenticationEnabled=FALSE
dot11RSNAConfigVersion=1
dot11RSNAConfigPairwiseKeysSupported=5
dot11RSNAConfigGroupCipherSize=0
dot11RSNAConfigPMKLifetime=43200
dot11RSNAConfigPMKReauthThreshold=70
dot11RSNAConfigNumberOfPTKSAReplayCounters=1
dot11RSNAConfigSATimeout=60
dot11RSNAAuthenticationSuiteSelected=00-00-00-0
dot11RSNAPairwiseCipherSelected=00-0f-ac-0
dot11RSNAGroupCipherSelected=00-0f-ac-0
dot11RSNAPMKIDUsed=
dot11RSNAAuthenticationSuiteRequested=00-00-00-0
dot11RSNAPairwiseCipherRequested=00-0f-ac-0
dot11RSNAGroupCipherRequested=00-0f-ac-0
dot11RSNAConfigNumberOfGTKSAReplayCounters=0
dot11RSNA4WayHandshakeFailures=0
dot1xSuppPaeState=9
dot1xSuppHeldPeriod=60
dot1xSuppAuthPeriod=30
dot1xSuppStartPeriod=30
dot1xSuppMaxStart=3
dot1xSuppSuppControlledPortStatus=Authorized
dot1xSuppBackendPaeState=2
dot1xSuppEapolFramesRx=0
dot1xSuppEapolFramesTx=2
dot1xSuppEapolStartFramesTx=0
dot1xSuppEapolLogoffFramesTx=0
dot1xSuppEapolRespFramesTx=0
dot1xSuppEapolReqIdFramesRx=0
dot1xSuppEapolReqFramesRx=0
dot1xSuppInvalidEapolFramesRx=0
dot1xSuppEapLengthErrorFramesRx=0
dot1xSuppLastEapolFrameVersion=0
dot1xSuppLastEapolFrameSource=00:00:00:00:00:00
24.help
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 help
commands:
mib = get MIB variables (dot1x, dot11)
25.license 檢視版本 宣告
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 license
wpa_cli v2.5-devel-6.0
26.dump 檢視變數
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 dump
ctrl_interface=/data/misc/wifi/sockets
ctrl_interface_group=null
eapol_version=1
ap_scan=1
disable_scan_offload=0
fast_reauth=1
opensc_engine_path=null
pkcs11_engine_path=null
pkcs11_module_path=null
openssl_ciphers=null
pcsc_reader=null
pcsc_pin=null
external_sim=1
driver_param=use_p2p_group_interface=1
dot11RSNAConfigPMKLifetime=0
dot11RSNAConfigPMKReauthThreshold=0
dot11RSNAConfigSATimeout=0
update_config=1
device_name=full_hq6737t_66_1ha_m0
manufacturer=alps
model_name=hq6737t_66_1ha_m0
model_number=hq6737t_66_1ha_m0
serial_number=SJVBBBA681500266
config_methods=physical_display virtual_push_button
wps_cred_processing=0
p2p_listen_reg_class=0
p2p_listen_channel=0
p2p_oper_reg_class=0
p2p_oper_channel=0
p2p_go_intent=7
p2p_ssid_postfix=null
persistent_reconnect=0
p2p_intra_bss=1
p2p_group_idle=0
p2p_passphrase_len=0
p2p_add_cli_chan=0
p2p_optimize_listen_chan=0
p2p_go_ht40=0
p2p_go_vht=0
p2p_disabled=0
p2p_go_ctwindow=0
p2p_no_group_iface=1
p2p_ignore_shared_freq=0
ip_addr_go=0.0.0.0
ip_addr_mask=0.0.0.0
ip_addr_start=0.0.0.0
ip_addr_end=0.0.0.0
p2p_cli_probe=0
bss_max_count=200
bss_expiration_age=180
bss_expiration_scan_count=2
filter_ssids=0
filter_rssi=0
max_num_sta=128
disassoc_low_ack=0
hs20=0
interworking=0
access_network_type=15
pbc_in_m1=0
autoscan=null
wps_nfc_dev_pw_id=0
ext_password_backend=null
p2p_go_max_inactivity=300
auto_interworking=0
okc=0
pmf=0
dtim_period=0
beacon_int=0
ignore_old_scan_res=0
scan_cur_freq=0
sched_scan_interval=0
tdls_external_control=0
osu_dir=null
wowlan_triggers=disconnect
p2p_search_delay=500
mac_addr=0
rand_addr_lifetime=60
preassoc_mac_addr=0
key_mgmt_offload=1
passive_scan=0
reassoc_same_bss_optim=0
wps_priority=0
overlay_loaded=0
27. log_level
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 log_level
Current level: MSGDUMP
Timestamp: 0
28.reconfigure 重新配置 reconfigure = force wpa_supplicant to re-read its configuration file
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reconfigure
29.scan_interval 設定掃描間隔
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan_interval 3
30.blacklist 黑名單
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist
31.DRIVER GET_STA_STATISTICS <MACADDRESS> 檢視手機STA資訊
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 DRIVER GET_STA_STATISTICS 5c:a8:6a:e5:cb:cd
sta_addr=5c:a8:6a:e5:cb:cd
link_score=100
per=0
rssi=-110
phy=0x00000000
rate=0.0
total_cnt=0
threshold_cnt=0
fail_cnt=0
timeout_cnt=0
apt=0
aat=0
TC_buf_full_cnt=0:0:0:0
TC_sta_que_len=0:0:0:0
TC_avg_que_len=0:0:0:0
TC_cur_que_len=8:8:8:8
flag=0x00000000
reserved0=00000000 00000000 00000000 00000000
reserved1=00000000 00000000 00000000 00000000
32:set 【set 命令設定環境變數(dump裡的變數)】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 set passive_scan 1
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 set oce 1
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 set okc 1
========================================================================================
33:get 【get 命令 查詢環境變數(dump裡的變數)】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get passive_scan
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get oce
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get okc
========================================================================================
34:pmksa 【 show PMKSA cache 】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 pmksa_flush 【 OK 】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 pmksa
Index / AA / PMKID / expiration (in seconds) / opportunistic
1 18:64:72:21:85:c3 e447f44b4d61bcc34fd325ba1dafd038 41657 0
========================================================================================
35:preauthenticate 【 預先認證 】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 preauthenticate 18:64:72:21:86:43
========================================================================================
36:blacklist <macAddr> 【 加入黑名單 】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist 18:64:72:21:86:43
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist // 展示黑名單
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist clear // 清楚黑名單
========================================================================================
37:log_level [ DEBUG | INFO ] 【 設定LOG等級 】
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 log_level
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 log_level DEBUG
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 log_level INFO
========================================================================================
commands: status [verbose] = get current WPA/EAPOL/EAP status ifname = get current interface name ping = pings wpa_supplicant relog = re-open log-file (allow rolling logs) note <text> = add a note to wpa_supplicant debug log mib = get MIB variables (dot1x, dot11) help [command] = show usage help interface [ifname] = show interfaces/select interface level <debug level> = change debug level license = show full wpa_cli license quit = exit wpa_cli set = set variables (shows list of variables when run without arguments) dump = dump config variables get <name> = get information logon = IEEE 802.1X EAPOL state machine logon logoff = IEEE 802.1X EAPOL state machine logoff pmksa = show PMKSA cache pmksa_flush = flush PMKSA cache entries reassociate = force reassociation reattach = force reassociation back to the same BSS preauthenticate <BSSID> = force preauthentication identity <network id> <identity> = configure identity for an SSID password <network id> <password> = configure password for an SSID new_password <network id> <password> = change password for an SSID pin <network id> <pin> = configure pin for an SSID otp <network id> <password> = configure one-time-password for an SSID passphrase <network id> <passphrase> = configure private key passphrase for an SSID sim <network id> <pin> = report SIM operation result bssid <network id> <BSSID> = set preferred BSSID for an SSID blacklist <BSSID> = add a BSSID to the blacklist blacklist clear = clear the blacklist blacklist = display the blacklist log_level <level> [<timestamp>] = update the log level/timestamp log_level = display the current log level and log options list_networks = list configured networks select_network <network id> = select a network (disable others) enable_network <network id> = enable a network disable_network <network id> = disable a network add_network = add a network remove_network <network id> = remove a network set_network <network id> <variable> <value> = set network variables (shows list of variables when run without arguments) get_network <network id> <variable> = get network variables dup_network <src network id> <dst network id> <variable> = duplicate network variables list_creds = list configured credentials add_cred = add a credential remove_cred <cred id> = remove a credential set_cred <cred id> <variable> <value> = set credential variables get_cred <cred id> <variable> = get credential variables save_config = save the current configuration disconnect = disconnect and wait for reassociate/reconnect command before connecting reconnect = like reassociate, but only takes effect if already disconnected scan = request new BSS scan scan_results = get latest scan results bss <<idx> | <bssid>> = get detailed scan result info get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies reconfigure = force wpa_supplicant to re-read its configuration file terminate = terminate wpa_supplicant interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param> <bridge_name> = adds new interface, all parameters but <ifname> are optional interface_remove <ifname> = removes the interface interface_list = list available interfaces ap_scan <value> = set ap_scan parameter scan_interval <value> = set scan_interval parameter (in seconds) bss_expire_age <value> = set BSS expiration age parameter bss_expire_count <value> = set BSS expiration scan count parameter bss_flush <value> = set BSS flush age (0 by default) stkstart <addr> = request STK negotiation with <addr> ft_ds <addr> = request over-the-DS FT with <addr> wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded) wps_check_pin <PIN> = verify PIN checksum wps_cancel Cancels the pending WPS operation wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC wps_nfc_config_token <WPS|NDEF> = build configuration token wps_nfc_token <WPS|NDEF> = create password token wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data nfc_get_handover_req <NDEF> <WPS> = create NFC handover request nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP wps_ap_pin [params..] = enable/disable AP PIN wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar wps_er_stop = stop Wi-Fi Protected Setup External Registrar wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar wps_er_learn <UUID> <PIN> = learn AP configuration wps_er_set_config <UUID> <network id> = set AP configuration for enrolling wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token ibss_rsn <addr> = request RSN authentication with <addr> in IBSS sta <addr> = get information about an associated station (AP) all_sta = get information about all associated stations (AP) deauthenticate <addr> = deauthenticate a station disassociate <addr> = disassociate a station chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters suspend = notification of suspend/hibernate resume = notification of resume/thaw roam <addr> = roam to the specified BSS p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds p2p_stop_find = stop P2P Devices search p2p_asp_provision <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device p2p_asp_provision_resp <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO) p2p_group_add [ht40] = add a new P2P group (local end as GO) p2p_prov_disc <addr> <method> = request provisioning discovery p2p_get_passphrase = get the passphrase for a group (GO only) p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request p2p_serv_disc_cancel_req <id> = cancel pending service discovery request p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response p2p_service_update = indicate change in local services p2p_serv_disc_external <external> = set external processing of service discovery p2p_service_flush = remove all stored service entries p2p_service_add <bonjour|upnp|asp> <query|version> <response|service> = add a local service p2p_service_rep asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service p2p_reject <addr> = reject connection attempts from a specific peer p2p_invite <cmd> [peer=addr] = invite peer p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers p2p_peer <address> = show information about known P2P peer p2p_set <field> <value> = set a P2P parameter p2p_flush = flush P2P state p2p_cancel = cancel P2P group formation p2p_unauthorize <address> = unauthorize a peer p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence p2p_ext_listen [<period> <interval>] = set extended listen timing p2p_remove_client <address|iface=address> = remove a peer from all groups wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement wfd_subelem_get <subelem> = get Wi-Fi Display subelement fetch_anqp = fetch ANQP information for all APs stop_fetch_anqp = stop fetch_anqp operation interworking_select [auto] = perform Interworking network selection interworking_connect <BSSID> = connect using Interworking credentials interworking_add_network <BSSID> = connect using Interworking credentials anqp_get <addr> <info id>[,<info id>]... = request ANQP information gas_request <addr> <AdvProtoID> [QueryReq] = GAS request gas_response_get <addr> <dialog token> [start,len] = Fetch last GAS response hs20_anqp_get <addr> <subtype>[,<subtype>]... = request HS 2.0 ANQP information nai_home_realm_list <addr> <home realm> = get HS20 nai home realm list hs20_icon_request <addr> <icon name> = get Hotspot 2.0 OSU icon fetch_osu = fetch OSU provider information from all APs cancel_fetch_osu = cancel fetch_osu command sta_autoconnect <0/1> = disable/enable automatic reconnection tdls_discover <addr> = request TDLS discovery with <addr> tdls_setup <addr> = request TDLS setup with <addr> tdls_teardown <addr> = tear down TDLS with <addr> wmm_ac_addts <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream wmm_ac_delts <tsid> = delete WMM-AC traffic stream wmm_ac_status = show status for Wireless Multi-Media Admission-Control tdls_chan_switch <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer tdls_cancel_chan_switch <addr> = disable channel switching with TDLS peer <addr> signal_poll = get signal parameters pktcnt_poll = get TX/RX packet counters reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication raw <params..> = Sent unprocessed command flush = flush wpa_supplicant state driver <command> = driver private commands radio_work = radio_work <show/add/done> vendor <vendor id> <command id> [<hex formatted command argument>] = Send vendor command neighbor_rep_request [ssid=<SSID>] = Trigger request to AP for neighboring AP report (with optional given SSID, default: current SSID) erp_flush = flush ERP keys mac_rand_scan <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization p2p_ago_enable ch=<ch> [ht40] [vht] = start an anonymous p2p group (local end as GO) p2p_ago_disable = stop an anonymous p2p group~ #相關推薦
vim 命令積累
光標位置 命令 一個 選中 vim cnblogs 中一 冒號 .cn vim命令yy :復制光標所在的一行4yy :復制所在行開始向下的4行 p :粘貼dd :剪切 光標所在的這一行2dd :剪切 光標所在行向下 2行dw:剪切一個單詞 D:當前行的光標後的內
adb命令積累(持續更新)
pct 執行 png 設備 span splay 選項 install stx 1、查看連接設備 adb devices 2、清除數據 adb shell pm clear com.wuba 3、安裝apk adb install 路徑 如何確定待測APP的包名: adb
命令積累——11.18打卡
1. cat /proc/version ####### 顯示發行版本 2.ls -trF | grep -v \/ | tail -n 1 &nb
shell命令積累
1、ulimit 檢視資源大小限制(如core、stack、pipe等) ulimit -a 2、sysctl 核心執行時引數配置 如修改core檔案生成路徑名稱:
adb命令積累(遲到的更新)
15、檢視網路連線狀態 adb shell dumpsys wifi |grep "Wi-Fi is " 結果有兩種,如下, 連線WiFi狀態 Wi-Fi is enabled 未連線WiFi狀態 Wi-Fi is disabled
ubantu命令積累
1. wget 網站檔案下載 wget -c <website> #從網址website下載檔案 -c 為了支援斷點傳輸 2.dpkg軟體安裝 sudo apt-get -f install 自動安裝依賴 dpkg (
三、Linux/UNIX操作命令積累【gzip、jar、tar、find、crontab】
在使用Linux/UNIX下,經常會使用文字介面去設定系統或作業系統,作者本人在工作的過程也在不斷接觸這方面的命令,所以為此特醞釀、準備、開始了本文的編寫。本文主要記錄自己平時遇到的一
windows命令提示符快速命令積累
msconfig:微機自啟動。設定開機時需要自啟動的軟體,或你的機子種病毒時你可以在那裡選擇執行最少的程式,用這種執行方式再用防毒軟體就可以把病毒清除的比較乾淨,但是,在清除完畢後,要恢復為正常模式。 regedit:
ndc iptables ip命令積累ing
1. adb shell ip route list ip route list //開啟WIFI連線熱點的資訊 default via 192.168.235.4 dev wlan0 metric 323 192.168.235.0/24 dev wla
linux基礎(二)----linux常用命令積累
才開始玩Linux 一進入看到黑漆漆的畫面 感覺無從下手 試試下面的命令吧 查詢檔案find絕對強悍find . -maxdepth 1 -name "@*" 這個命令意思是,查詢當前目錄下以@開頭的檔案或者目錄,搜尋深度為一級也就是隻在當前目錄找(.是 當前目錄的意思)
WIFI的ADB命令積累
1.status 檢視當前的WIFI狀態 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 status bssid=70:62:b8:62:2e:c4 // 一個長度為48位
九、Linux/UNIX操作命令積累【rpm】
在使用Linux/UNIX下,經常會使用文字介面去設定系統或作業系統,作者本人在工作的過程也在不斷接觸這方面的命令,所以為此特醞釀、準備、開始了本文的編寫。本文主要記錄自己平時遇到的一些Li
adb命令積累
adb install appname.apk 安裝appname.apk到手機。 adb devices 列出連線的所有裝置 adb -s BH905UBU09 push test.apk
積累——SQLCommand命令
個數 分類 -s tom .exe nbsp 結構 aps reader SQLcommand表示要對SQL數據庫運行的一個 T-SQL 語句或存儲過程。以便運行大量操作或處理數據庫結構。 在對數據庫訪問的時候,就經經常使用到這個。看看它是怎麽
Linux積累 命令之cat和wc
名稱 line 組合 補充 linux 說明 conn ... 字數 cat主要有三大功能: 1.一次顯示整個文件。 $ cat filename 2.從鍵盤創建一個文件。 $ cat > filename 只能創建新文件,不能編輯已有文件. 3.將幾個文件合
Git使用(積累一些常用的命令)
class -c merge tps comm abort nbsp com bsp 1. 取消某一次合並 git merge --abort 可以參考的教程:https://www.liaoxuefeng.com/wiki/0013739516305
積累命令、用戶、正則表達式
pool 連接 roc 禁止 啟用 新的 text modify deb 1 如何保存linux歷史命令並顯示命令操作時間 HISTTIMEFORMAT="%F %T"
命令執行的tip
所有 esc bat start 出現 .get tar number div 先看一個例子:本地測試環境:php 5.4.45 + win <?php $command = ‘dir ‘.$_POST[‘dir‘]; $escaped_comman
oozie 常用命令
3.3 ued submit operation -s clean up sim killed require 1.驗證wokflow.xmloozie validate /appcom/apps/hduser0401/mbl_webtrends/workflow.xml
python基礎之socket編程-------基於tcp的套接字實現遠程執行命令的操作
logs lose stream res std 遠程控制 python log out 遠程實現cmd功能: import socket import subprocess phone=socket.socket(socket.AF_INET,socket.SOC