1. 程式人生 > >WIFI的ADB命令積累

WIFI的ADB命令積累

1.status  檢視當前的WIFI狀態
adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 status
bssid=70:62:b8:62:2e:c4   // 一個長度為48位二進位制的數字標誌,用於識別不同的BSS(Basic Service Set)基本服務集,主要用於過濾
freq=2412(1)  2417(2)  2422(3) 2427(4) 2432(5) 2437(6) 2442(7) 2447(8) 2452(9) 2457(10) 2462(11) 2467(12) 2472(13)  //與熱點連線的通道
ssid=cts //當前連線的熱點AP的名稱
id=2   // 當前熱點AP記錄下STA的編號
mode=station   // 當前裝置的工作模式為STA
pairwise_cipher=CCMP 【NONE】//表示當前熱點AP接受的安全加密演算法  CCMP表示的是    密碼塊訊息完整性協議
group_cipher=TKIP 【CCMP NONE】    //group_cipher 表示當前熱點AP接受的安全加密演算法 TKIP 表示的是  臨時密碼完整性協議
key_mgmt=WPA2-PSK 【NONE】  //認證金鑰管理協議
wpa_state=COMPLETED 【SCANNING DISCONNECTED】//STA的連線狀態
ip_address=192.168.235.18  //熱點分配給STA的IP地址(任意分配)
p2p_device_address=5e:a8:6a:e5:cb:cd  // 當前裝置作為 WIFI直連時的MAC地址?  是STA的MAC地址加了2 從5e->5c 其後數字一樣?
address=5c:a8:6a:e5:cb:cd        //STA的MAC地址
uuid=6885e701-c4a3-51c9-bd4d-98b0a5204df2    //全通通用唯一裝置識別符號  固定


2.terminate   立即關閉 wpa_supplicant   // 關閉WIFI
adb shell wpa_cli -iwlan0 
[email protected]
:wpa_wlan0 IFNAME=wlan0 terminate 3.list_networks 連線過的WIFI adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 list_networks network id / ssid / bssid / flags 0 and-Business any 1 CMCC-WEB any 2 cts any 3 MYA-L03_虧哦UK大酒店 any 4 HUAWEI_MYA_3afb any [CURRENT] 4.select_network 設定連線到熱點 nitid對應的熱點 先斷開連線的熱點 再去連線netid adb shell wpa_cli -iwlan0
[email protected]
:wpa_wlan0 IFNAME=wlan0 select_network 2 5.disable_network 斷開與熱點的連線 斷開後又會預設連線上 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 disable_network 5 6.signal_poll get signal parameters adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 signal_poll RSSI=-23 LINKSPEED=65 NOISE=9999 FREQUENCY=2442 7.pktcnt_poll get TX/RX packet counters adb shell wpa_cli -iwlan0
[email protected]
:wpa_wlan0 IFNAME=wlan0 pktcnt_poll TXGOOD=1146 TXBAD=1 RXGOOD=0 8. DRIVER MACADDR 獲得MAC地址 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 DRIVER MACADDR Macaddr = 5c:a8:6a:e5:cb:cd 9.reassociate 重連線 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reassociate 10.reattach 重連線當前已連線的WIFI adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reattach 11.ifname 檢視當前使用的網絡卡 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 ifname wlan0 12.interface 當前可用介面 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 interface Available interfaces: p2p0 wlan0 13.ping 檢測Supplicant是否正常 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 ping PONG 14.add_network 儲存一個網路(引數未知) adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 add_network XXXX 15.remove_network adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 remove_network 6 16.disconnect 段開當前連線 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 disconnect 17.reconnect 再次連線 如果已經連線則不執行 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reconnect 18.scan 啟動掃描 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan 19.scan_results 得到最新的掃描結果 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan_results bssid / frequency / signal level / flags / ssid 70:62:b8:62:2e:c4 2412 -68 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS] cts 02:08:22:76:b5:73 2417 -24 [WPA2-PSK-CCMP][WPS][ESS] Lenovo S1La40 06:19:70:27:ca:96 2462 -54 [WPA2-EAP-CCMP-preauth][ESS] CMCC 00:23:69:ce:58:b0 2412 -62 [WPA-PSK-TKIP][ESS] LJ-7W1-V3-Linksys 06:19:70:00:32:c0 2472 -61 [WPA2-EAP-CCMP-preauth][ESS] CMCC 00:22:aa:9e:31:48 2452 -71 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] BW-wx20s b8:e8:56:48:0e:ea 2462 -85 [WPA2-PSK-CCMP][ESS] KuriMBP 00:19:70:27:ca:96 2462 -55 [ESS] CMCC-WEB 16:19:70:27:ca:96 2462 -53 [ESS] and-Business 16:19:70:00:32:c0 2472 -60 [ESS] and-Business 16:19:70:00:30:2e 2437 -74 [ESS] and-Business 00:19:70:00:32:c0 2472 -60 [ESS] CMCC-WEB 02:08:22:da:90:11 2417 -25 [WPS][ESS] HUAWEI_MYA_3afb 06:19:70:00:30:2e 2437 -65 [WPA2-EAP-CCMP-preauth][ESS] CMCC 00:19:70:00:30:2e 2437 -73 [ESS] CMCC-WEB 44:6d:57:99:38:a1 2412 -78 [WPA2-PSK-CCMP][ESS] whr360 02:08:22:c6:74:1a 2437 -75 [WPA2-PSK-CCMP][WPS][ESS] AAA5860 00:19:70:00:30:d6 2412 -78 [ESS] CMCC-WEB 06:19:70:00:30:d6 2412 -78 [WPA2-EAP-CCMP-preauth][ESS] CMCC 06:19:70:00:30:88 2472 -82 [WPA2-EAP-CCMP-preauth][ESS] CMCC 16:19:70:00:30:88 2472 -80 [ESS] and-Business 12:0e:0e:20:63:b7 2437 -78 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] VIP-guest 16:19:70:00:30:d6 2412 -78 [ESS] and-Business 10:0e:0e:20:64:ca 2462 -86 [ESS] HQ_guest 00:23:69:ce:58:1d 2437 -81 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] LJ-Meeting 01 00:22:aa:9e:31:24 2412 -91 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] BW-wx20s 00:19:70:00:30:88 2472 -82 [ESS] CMCC-WEB 22:0e:0e:20:63:b7 2437 -83 [ESS] HQ_Office 20.bss 檢視熱點詳情 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss 70:62:b8:62:2e:c4 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss cts id=0 bssid=70:62:b8:62:2e:c4 //BSSID 唯一標誌集合 freq=2412 //通道 beacon_int=100 //beacon幀間隔 用於通知AP的狀態 capabilities=0x0411 網路接入效能 qual=0 noise=-89 //噪音程度 數值越大 噪音越大 level=-63 //訊號程度 數值越大 訊號越大 tsf=0000519432862866 //時間同步 age=11 ie=0003637473010882848b962430486c0301012a01042f010430180100000fac020200000fac040 00fac020100000fac020c0032040c1218602d1aff1917ffffff00010000000000000000000000000 000000000003d16010d16000000000000000000000000000000000000007f080000000000000040d d870050f204104a0001101044000102103b000103104700101e88f48914be85b618487062b8622ec 710210006442d4c696e6b1023000d442d4c696e6b20526f75746572102400084449522d3836384c1 042000830303030303030301054000800060050f2040001101100084449522d3836384c100800022 78c103c0001011049000600372a000120dd090010180206001c0000dd1a0050f20101000050f2020 2000050f2040050f20201000050f202dd180050f2020101840003a4000027a4000042435e0062322 f00 flags=[WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS] ssid=cts wps_state=configured wps_primary_device_type=6-0050F204-1 wps_device_name=DIR-868L wps_config_methods=0x278c snr=26 //訊號噪聲比 越大越好 【 level - noise 】 -63-(-89) = 26 est_throughput=135000 bps WIFI吞吐量 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 bss 02:08:22:da:90:11 ss 02:08:22:da:90:11 id=98 bssid=02:08:22:da:90:11 freq=2417 beacon_int=100 capabilities=0x0421 qual=0 noise=-89 level=-30 tsf=0000519432863304 age=64 ie=000f4855415745495f4d59415f33616662010882848b960c12182403010232043048606c2a010 02d1a300103ff000000000000000000000001000000000000000000003d160200010000000000000 00000000000000000000000007f0100dd180050f2020101800003a4000027a4000042435e0062322 f00dd180050f204104a00011010440001021049000600372a000120 flags=[WPS][ESS] ssid=HUAWEI_MYA_3afb wps_state=configured snr=59 【 level - noise】 -30-(-89) = 59 est_throughput=65000 bps WIFI吞吐量 21.get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability eap MD5 TLS WFA-UNAUTH-TLS MSCHAPV2 PEAP TTLS GTC OTP SIM LEAP AKA AKA' FAST WSC PWD adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability pairwise CCMP TKIP adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability group CCMP TKIP WEP104 WEP40 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability key_mgmt NONE IEEE8021X WPA-EAP WPA-PSK adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability proto RSN WPA adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability auth_alg OPEN SHARED LEAP adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability channels Mode[G] Channels: 1 2 3 4 5 6 7 8 9 10 11 12 13 Mode[A] Channels: 36 40 44 48 52 56 60 64 149 153 157 161 165 Mode[B] Channels: 1 2 3 4 5 6 7 8 9 10 11 12 13 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability freq Mode[G] Channels: 1 = 2412 MHz 2 = 2417 MHz 3 = 2422 MHz 4 = 2427 MHz 5 = 2432 MHz 6 = 2437 MHz 7 = 2442 MHz 8 = 2447 MHz 9 = 2452 MHz 10 = 2457 MHz 11 = 2462 MHz 12 = 2467 MHz 13 = 2472 MHz Mode[A] Channels: 36 = 5180 MHz 40 = 5200 MHz 44 = 5220 MHz 48 = 5240 MHz 52 = 5260 MHz 56 = 5280 MHz 60 = 5300 MHz 64 = 5320 MHz 149 = 5745 MHz 153 = 5765 MHz 157 = 5785 MHz 161 = 5805 MHz 165 = 5825 MHz Mode[B] Channels: 1 = 2412 MHz 2 = 2417 MHz 3 = 2422 MHz 4 = 2427 MHz 5 = 2432 MHz 6 = 2437 MHz 7 = 2442 MHz 8 = 2447 MHz 9 = 2452 MHz 10 = 2457 MHz 11 = 2462 MHz 12 = 2467 MHz 13 = 2472 MHz adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 get_capability modes IBSS 22.relog adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 relog OK 23.mib adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 mib (Manager Info Base)基礎資料庫 dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=TRUE dot11RSNAEnabled=FALSE dot11RSNAPreauthenticationEnabled=FALSE dot11RSNAConfigVersion=1 dot11RSNAConfigPairwiseKeysSupported=5 dot11RSNAConfigGroupCipherSize=0 dot11RSNAConfigPMKLifetime=43200 dot11RSNAConfigPMKReauthThreshold=70 dot11RSNAConfigNumberOfPTKSAReplayCounters=1 dot11RSNAConfigSATimeout=60 dot11RSNAAuthenticationSuiteSelected=00-00-00-0 dot11RSNAPairwiseCipherSelected=00-0f-ac-0 dot11RSNAGroupCipherSelected=00-0f-ac-0 dot11RSNAPMKIDUsed= dot11RSNAAuthenticationSuiteRequested=00-00-00-0 dot11RSNAPairwiseCipherRequested=00-0f-ac-0 dot11RSNAGroupCipherRequested=00-0f-ac-0 dot11RSNAConfigNumberOfGTKSAReplayCounters=0 dot11RSNA4WayHandshakeFailures=0 dot1xSuppPaeState=9 dot1xSuppHeldPeriod=60 dot1xSuppAuthPeriod=30 dot1xSuppStartPeriod=30 dot1xSuppMaxStart=3 dot1xSuppSuppControlledPortStatus=Authorized dot1xSuppBackendPaeState=2 dot1xSuppEapolFramesRx=0 dot1xSuppEapolFramesTx=2 dot1xSuppEapolStartFramesTx=0 dot1xSuppEapolLogoffFramesTx=0 dot1xSuppEapolRespFramesTx=0 dot1xSuppEapolReqIdFramesRx=0 dot1xSuppEapolReqFramesRx=0 dot1xSuppInvalidEapolFramesRx=0 dot1xSuppEapLengthErrorFramesRx=0 dot1xSuppLastEapolFrameVersion=0 dot1xSuppLastEapolFrameSource=00:00:00:00:00:00 24.help adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 help commands: mib = get MIB variables (dot1x, dot11) 25.license 檢視版本 宣告 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 license wpa_cli v2.5-devel-6.0 26.dump 檢視變數 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 dump ctrl_interface=/data/misc/wifi/sockets ctrl_interface_group=null eapol_version=1 ap_scan=1 disable_scan_offload=0 fast_reauth=1 opensc_engine_path=null pkcs11_engine_path=null pkcs11_module_path=null openssl_ciphers=null pcsc_reader=null pcsc_pin=null external_sim=1 driver_param=use_p2p_group_interface=1 dot11RSNAConfigPMKLifetime=0 dot11RSNAConfigPMKReauthThreshold=0 dot11RSNAConfigSATimeout=0 update_config=1 device_name=full_hq6737t_66_1ha_m0 manufacturer=alps model_name=hq6737t_66_1ha_m0 model_number=hq6737t_66_1ha_m0 serial_number=SJVBBBA681500266 config_methods=physical_display virtual_push_button wps_cred_processing=0 p2p_listen_reg_class=0 p2p_listen_channel=0 p2p_oper_reg_class=0 p2p_oper_channel=0 p2p_go_intent=7 p2p_ssid_postfix=null persistent_reconnect=0 p2p_intra_bss=1 p2p_group_idle=0 p2p_passphrase_len=0 p2p_add_cli_chan=0 p2p_optimize_listen_chan=0 p2p_go_ht40=0 p2p_go_vht=0 p2p_disabled=0 p2p_go_ctwindow=0 p2p_no_group_iface=1 p2p_ignore_shared_freq=0 ip_addr_go=0.0.0.0 ip_addr_mask=0.0.0.0 ip_addr_start=0.0.0.0 ip_addr_end=0.0.0.0 p2p_cli_probe=0 bss_max_count=200 bss_expiration_age=180 bss_expiration_scan_count=2 filter_ssids=0 filter_rssi=0 max_num_sta=128 disassoc_low_ack=0 hs20=0 interworking=0 access_network_type=15 pbc_in_m1=0 autoscan=null wps_nfc_dev_pw_id=0 ext_password_backend=null p2p_go_max_inactivity=300 auto_interworking=0 okc=0 pmf=0 dtim_period=0 beacon_int=0 ignore_old_scan_res=0 scan_cur_freq=0 sched_scan_interval=0 tdls_external_control=0 osu_dir=null wowlan_triggers=disconnect p2p_search_delay=500 mac_addr=0 rand_addr_lifetime=60 preassoc_mac_addr=0 key_mgmt_offload=1 passive_scan=0 reassoc_same_bss_optim=0 wps_priority=0 overlay_loaded=0 27. log_level adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 log_level Current level: MSGDUMP Timestamp: 0 28.reconfigure 重新配置 reconfigure = force wpa_supplicant to re-read its configuration file adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 reconfigure 29.scan_interval 設定掃描間隔 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 scan_interval 3 30.blacklist 黑名單 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist 31.DRIVER GET_STA_STATISTICS <MACADDRESS> 檢視手機STA資訊 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 DRIVER GET_STA_STATISTICS 5c:a8:6a:e5:cb:cd sta_addr=5c:a8:6a:e5:cb:cd link_score=100 per=0 rssi=-110 phy=0x00000000 rate=0.0 total_cnt=0 threshold_cnt=0 fail_cnt=0 timeout_cnt=0 apt=0 aat=0 TC_buf_full_cnt=0:0:0:0 TC_sta_que_len=0:0:0:0 TC_avg_que_len=0:0:0:0 TC_cur_que_len=8:8:8:8 flag=0x00000000 reserved0=00000000 00000000 00000000 00000000 reserved1=00000000 00000000 00000000 00000000 32:set   【set 命令設定環境變數(dump裡的變數)】 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  set passive_scan  1 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  set oce  1 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  set  okc  1 ======================================================================================== 33:get   【get 命令 查詢環境變數(dump裡的變數)】 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  get passive_scan adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  get oce adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  get  okc ======================================================================================== 34:pmksa   【  show PMKSA cache  】  adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 pmksa_flush  【 OK 】 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 pmksa Index / AA / PMKID / expiration (in seconds) / opportunistic 1 18:64:72:21:85:c3 e447f44b4d61bcc34fd325ba1dafd038 41657 0 ======================================================================================== 35:preauthenticate   【 預先認證 】  adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 preauthenticate 18:64:72:21:86:43 ======================================================================================== 36:blacklist <macAddr>  【 加入黑名單 】  adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist 18:64:72:21:86:43 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist // 展示黑名單 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 blacklist clear  // 清楚黑名單 ======================================================================================== 37:log_level  [ DEBUG | INFO ]  【 設定LOG等級 】  adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  log_level adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  log_level   DEBUG adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0  log_level   INFO
========================================================================================
commands: status [verbose] = get current WPA/EAPOL/EAP status ifname = get current interface name ping = pings wpa_supplicant relog = re-open log-file (allow rolling logs) note <text> = add a note to wpa_supplicant debug log mib = get MIB variables (dot1x, dot11) help [command] = show usage help interface [ifname] = show interfaces/select interface level <debug level> = change debug level license = show full wpa_cli license quit = exit wpa_cli set = set variables (shows list of variables when run without arguments) dump = dump config variables get <name> = get information logon = IEEE 802.1X EAPOL state machine logon logoff = IEEE 802.1X EAPOL state machine logoff pmksa = show PMKSA cache pmksa_flush = flush PMKSA cache entries reassociate = force reassociation reattach = force reassociation back to the same BSS preauthenticate <BSSID> = force preauthentication identity <network id> <identity> = configure identity for an SSID password <network id> <password> = configure password for an SSID new_password <network id> <password> = change password for an SSID pin <network id> <pin> = configure pin for an SSID otp <network id> <password> = configure one-time-password for an SSID passphrase <network id> <passphrase> = configure private key passphrase for an SSID sim <network id> <pin> = report SIM operation result bssid <network id> <BSSID> = set preferred BSSID for an SSID blacklist <BSSID> = add a BSSID to the blacklist blacklist clear = clear the blacklist blacklist = display the blacklist log_level <level> [<timestamp>] = update the log level/timestamp log_level = display the current log level and log options list_networks = list configured networks select_network <network id> = select a network (disable others) enable_network <network id> = enable a network disable_network <network id> = disable a network add_network = add a network remove_network <network id> = remove a network set_network <network id> <variable> <value> = set network variables (shows list of variables when run without arguments) get_network <network id> <variable> = get network variables dup_network <src network id> <dst network id> <variable> = duplicate network variables list_creds = list configured credentials add_cred = add a credential remove_cred <cred id> = remove a credential set_cred <cred id> <variable> <value> = set credential variables get_cred <cred id> <variable> = get credential variables save_config = save the current configuration disconnect = disconnect and wait for reassociate/reconnect command before connecting reconnect = like reassociate, but only takes effect if already disconnected scan = request new BSS scan scan_results = get latest scan results bss <<idx> | <bssid>> = get detailed scan result info get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies reconfigure = force wpa_supplicant to re-read its configuration file terminate = terminate wpa_supplicant interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param> <bridge_name> = adds new interface, all parameters but <ifname> are optional interface_remove <ifname> = removes the interface interface_list = list available interfaces ap_scan <value> = set ap_scan parameter scan_interval <value> = set scan_interval parameter (in seconds) bss_expire_age <value> = set BSS expiration age parameter bss_expire_count <value> = set BSS expiration scan count parameter bss_flush <value> = set BSS flush age (0 by default) stkstart <addr> = request STK negotiation with <addr> ft_ds <addr> = request over-the-DS FT with <addr> wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded) wps_check_pin <PIN> = verify PIN checksum wps_cancel Cancels the pending WPS operation wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC wps_nfc_config_token <WPS|NDEF> = build configuration token wps_nfc_token <WPS|NDEF> = create password token wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data nfc_get_handover_req <NDEF> <WPS> = create NFC handover request nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP wps_ap_pin [params..] = enable/disable AP PIN wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar wps_er_stop = stop Wi-Fi Protected Setup External Registrar wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar wps_er_learn <UUID> <PIN> = learn AP configuration wps_er_set_config <UUID> <network id> = set AP configuration for enrolling wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token ibss_rsn <addr> = request RSN authentication with <addr> in IBSS sta <addr> = get information about an associated station (AP) all_sta = get information about all associated stations (AP) deauthenticate <addr> = deauthenticate a station disassociate <addr> = disassociate a station chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters suspend = notification of suspend/hibernate resume = notification of resume/thaw roam <addr> = roam to the specified BSS p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds p2p_stop_find = stop P2P Devices search p2p_asp_provision <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device p2p_asp_provision_resp <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO) p2p_group_add [ht40] = add a new P2P group (local end as GO) p2p_prov_disc <addr> <method> = request provisioning discovery p2p_get_passphrase = get the passphrase for a group (GO only) p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request p2p_serv_disc_cancel_req <id> = cancel pending service discovery request p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response p2p_service_update = indicate change in local services p2p_serv_disc_external <external> = set external processing of service discovery p2p_service_flush = remove all stored service entries p2p_service_add <bonjour|upnp|asp> <query|version> <response|service> = add a local service p2p_service_rep asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service p2p_reject <addr> = reject connection attempts from a specific peer p2p_invite <cmd> [peer=addr] = invite peer p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers p2p_peer <address> = show information about known P2P peer p2p_set <field> <value> = set a P2P parameter p2p_flush = flush P2P state p2p_cancel = cancel P2P group formation p2p_unauthorize <address> = unauthorize a peer p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence p2p_ext_listen [<period> <interval>] = set extended listen timing p2p_remove_client <address|iface=address> = remove a peer from all groups wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement wfd_subelem_get <subelem> = get Wi-Fi Display subelement fetch_anqp = fetch ANQP information for all APs stop_fetch_anqp = stop fetch_anqp operation interworking_select [auto] = perform Interworking network selection interworking_connect <BSSID> = connect using Interworking credentials interworking_add_network <BSSID> = connect using Interworking credentials anqp_get <addr> <info id>[,<info id>]... = request ANQP information gas_request <addr> <AdvProtoID> [QueryReq] = GAS request gas_response_get <addr> <dialog token> [start,len] = Fetch last GAS response hs20_anqp_get <addr> <subtype>[,<subtype>]... = request HS 2.0 ANQP information nai_home_realm_list <addr> <home realm> = get HS20 nai home realm list hs20_icon_request <addr> <icon name> = get Hotspot 2.0 OSU icon fetch_osu = fetch OSU provider information from all APs cancel_fetch_osu = cancel fetch_osu command sta_autoconnect <0/1> = disable/enable automatic reconnection tdls_discover <addr> = request TDLS discovery with <addr> tdls_setup <addr> = request TDLS setup with <addr> tdls_teardown <addr> = tear down TDLS with <addr> wmm_ac_addts <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream wmm_ac_delts <tsid> = delete WMM-AC traffic stream wmm_ac_status = show status for Wireless Multi-Media Admission-Control tdls_chan_switch <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer tdls_cancel_chan_switch <addr> = disable channel switching with TDLS peer <addr> signal_poll = get signal parameters pktcnt_poll = get TX/RX packet counters reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication raw <params..> = Sent unprocessed command flush = flush wpa_supplicant state driver <command> = driver private commands radio_work = radio_work <show/add/done> vendor <vendor id> <command id> [<hex formatted command argument>] = Send vendor command neighbor_rep_request [ssid=<SSID>] = Trigger request to AP for neighboring AP report (with optional given SSID, default: current SSID) erp_flush = flush ERP keys mac_rand_scan <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization p2p_ago_enable ch=<ch> [ht40] [vht] = start an anonymous p2p group (local end as GO) p2p_ago_disable = stop an anonymous p2p group~ #

相關推薦

vim 命令積累

光標位置 命令 一個 選中 vim cnblogs 中一 冒號 .cn vim命令yy :復制光標所在的一行4yy :復制所在行開始向下的4行 p :粘貼dd :剪切 光標所在的這一行2dd :剪切 光標所在行向下 2行dw:剪切一個單詞 D:當前行的光標後的內

adb命令積累(持續更新)

pct 執行 png 設備 span splay 選項 install stx 1、查看連接設備 adb devices 2、清除數據 adb shell pm clear com.wuba 3、安裝apk adb install 路徑 如何確定待測APP的包名: adb

命令積累——11.18打卡

1. cat /proc/version          #######   顯示發行版本 2.ls -trF | grep -v \/ | tail -n 1 &nb

shell命令積累

1、ulimit 檢視資源大小限制(如core、stack、pipe等)      ulimit  -a 2、sysctl  核心執行時引數配置    如修改core檔案生成路徑名稱:   

adb命令積累(遲到的更新)

15、檢視網路連線狀態 adb shell dumpsys wifi |grep "Wi-Fi is " 結果有兩種,如下, 連線WiFi狀態 Wi-Fi is enabled 未連線WiFi狀態 Wi-Fi is disabled  

ubantu命令積累

1.  wget 網站檔案下載  wget -c <website>            #從網址website下載檔案 -c 為了支援斷點傳輸 2.dpkg軟體安裝     sudo apt-get -f install  自動安裝依賴 dpkg (

三、Linux/UNIX操作命令積累【gzip、jar、tar、find、crontab】

        在使用Linux/UNIX下,經常會使用文字介面去設定系統或作業系統,作者本人在工作的過程也在不斷接觸這方面的命令,所以為此特醞釀、準備、開始了本文的編寫。本文主要記錄自己平時遇到的一

windows命令提示符快速命令積累

msconfig:微機自啟動。設定開機時需要自啟動的軟體,或你的機子種病毒時你可以在那裡選擇執行最少的程式,用這種執行方式再用防毒軟體就可以把病毒清除的比較乾淨,但是,在清除完畢後,要恢復為正常模式。 regedit:

ndc iptables ip命令積累ing

1. adb shell ip route list ip route list //開啟WIFI連線熱點的資訊 default via 192.168.235.4 dev wlan0 metric 323 192.168.235.0/24 dev wla

linux基礎(二)----linux常用命令積累

才開始玩Linux 一進入看到黑漆漆的畫面 感覺無從下手  試試下面的命令吧 查詢檔案find絕對強悍find . -maxdepth 1 -name "@*" 這個命令意思是,查詢當前目錄下以@開頭的檔案或者目錄,搜尋深度為一級也就是隻在當前目錄找(.是 當前目錄的意思)

WIFI的ADB命令積累

1.status 檢視當前的WIFI狀態 adb shell wpa_cli -iwlan0 [email protected]:wpa_wlan0 IFNAME=wlan0 status bssid=70:62:b8:62:2e:c4 // 一個長度為48位

九、Linux/UNIX操作命令積累【rpm】

      在使用Linux/UNIX下,經常會使用文字介面去設定系統或作業系統,作者本人在工作的過程也在不斷接觸這方面的命令,所以為此特醞釀、準備、開始了本文的編寫。本文主要記錄自己平時遇到的一些Li

adb命令積累

adb install appname.apk 安裝appname.apk到手機。 adb devices 列出連線的所有裝置 adb -s BH905UBU09 push test.apk

積累——SQLCommand命令

個數 分類 -s tom .exe nbsp 結構 aps reader SQLcommand表示要對SQL數據庫運行的一個 T-SQL 語句或存儲過程。以便運行大量操作或處理數據庫結構。 在對數據庫訪問的時候,就經經常使用到這個。看看它是怎麽

Linux積累 命令之cat和wc

名稱 line 組合 補充 linux 說明 conn ... 字數 cat主要有三大功能: 1.一次顯示整個文件。 $ cat filename 2.從鍵盤創建一個文件。 $ cat > filename 只能創建新文件,不能編輯已有文件. 3.將幾個文件合

Git使用(積累一些常用的命令

class -c merge tps comm abort nbsp com bsp 1. 取消某一次合並 git merge --abort 可以參考的教程:https://www.liaoxuefeng.com/wiki/0013739516305

積累命令、用戶、正則表達式

pool 連接 roc 禁止 啟用 新的 text modify deb 1  如何保存linux歷史命令並顯示命令操作時間       HISTTIMEFORMAT="%F %T"

命令執行的tip

所有 esc bat start 出現 .get tar number div 先看一個例子:本地測試環境:php 5.4.45 + win <?php $command = ‘dir ‘.$_POST[‘dir‘]; $escaped_comman

oozie 常用命令

3.3 ued submit operation -s clean up sim killed require 1.驗證wokflow.xmloozie validate /appcom/apps/hduser0401/mbl_webtrends/workflow.xml 

python基礎之socket編程-------基於tcp的套接字實現遠程執行命令的操作

logs lose stream res std 遠程控制 python log out 遠程實現cmd功能: import socket import subprocess phone=socket.socket(socket.AF_INET,socket.SOC