【安全牛学习笔记】AIREPLAY-NG
来源:互联网 发布:qp个案分析比赛知乎 编辑:程序博客网 时间:2024/06/05 04:48
AIREPLAY-NG
产生或者加速无线通信流量
向无线网络中注入数据包
伪造身份验证
强制重新身份验证
抓包重放
用于后续WEP和WPA密码破解
支持10种包注入
获取包的两种途径
指定接口(-i)
抓包文件pcap(-r)
Attack modes (numbers can still be used):
--deauth count : deauthenticate 1 or all stations (-0)
--fakeauth delay : fake authentication with AP (-1)
--interactive : interactive frame selection (-2)
--arpreplay : standard ARP-request replay (-3)
--chopchop : decrypt/chopchop WEP packet (-4)
--fragment : generates valid keystream (-5)
--caffe-latte : query a client for new IVs (-6)
--cfrag : fragments against a client (-7)
--migmode : attack WPA migration mode (-8)
--test : tests injection and quality (-9)
AIREPLAY-NG
aireplay-ng <options><interface name>
Filter命令选项 (除0、1两种攻击方式)
Filter options:
-b bssid : MAC address, Access Point
-d dmac : MAC address, Destination
-s smac : MAC address, Source
-m len : minimum packet length
-n len : maximum packet length
-u type : frame control, type field
-v subt : frame control, subtype field
-t tools : frame control, To DS bit
-f fromds : frame control, From DS bit
-w iswep : frame control, WEP bit
-D : disable AP detection
AIREPLAY-NG
Replay命令选项
Replay options:
-x nbpps : number of packets per second
-p fctrl : set frame control word (hex)
-a bssid : set Access point MAC address
-c dmac : set Destination MAC address
-h smac : set Source MAC address
-g smac : change ring buffer size (default: 8)
-F : choose first matching packet
Fakeauth attack options:
-e essid : set target AP SSID
-o npckts : number of packets per burst (0=autp, default: 1)
-q sec : seconds between keep-alives
-Q : send reassociation requests
-y prga : keystream for shared key auth
-T n : exit after retry fake auth request n time
Arp Replay attack options:
-j : inject FromDs packets
Fragmentation attack options:
-k IP : set destination IP in fragments
-l IP : set source IP in fragments
AIREPLAY-NG排错
Aireplay-ng命令挂起没有任何输出
无线网卡与AP工作在不同信道
报错"write failed: Cannot allocate memory wi_write():illegal seek"
无线网卡使用Broadcom芯片(bcm43xx),替换为b43驱动可解决
可注入但速度很慢,并提示内核消息"rtc:lost some interrupts at 1024Hz"
没有修正方法,此时可以启动多个aireplay-ng命令提高速度
使用-h参数指定注入MAC地址与网卡MAC地址不一致报错
建议保持一致 (macchange)
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan2 Link encap:Ethernet HWaddr 08:57:00:0c:96:68
UP BROADCAST MULTICAST MTU:1500 Metric:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:0 (0.0 B) TX bytes:0 (0.0 B)
root@kali:~# iwconfig
eth0 no wireless extensions
wlan0 IEEE 802.11nbgn ESSID:off/any
Mode:Managed Access Point: No-Associated Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
wlan2 IEEE 802.11nbgn ESSID:off/any
Mode:Managed Access Point: No-Associated Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
lo no wireless extensions.
root@kali:~# service network-manager stop
root@kali:~# airmon-ng check kill
Killing these processes:
PID Name
871 wpa_supplicant
1542 dhclient
root@kali:~# airmon-ng start wlan0
NO interfering processes found
PHY Interface Driver Chipest
phy1 wlan0 rt2800usb Ralink Technology, Corp. RT5370
(mac80211 monitor mode vif enable for [phy0]wlan2 on [phy0]wlan2mon)
(mac80211 station mode vif disabled for [phy0]wlan2)
phy0 wlan2 ath9k_htc Atheros Communications, Inc, AR9271 802.11n
root@kali:~# airmon-ng start wlan2
NO interfering processes found
PHY Interface Driver Chipest
phy1 wlan0mon rt2800usb Ralink Technology, Corp. RT5370
phy0 wlan2 ath9k_htc Atheros Communications, Inc, AR9271 802.11n
(mac80211 monitor mode vif enable for [phy0]wlan2 on [phy0]wlan2mon)
(mac80211 station mode vif disabled for [phy0]wlan2)
root@kali:~# iwconfig
eth0 no wireless extensions
wlan0mon IEEE 802.11bgn Mode:Monitor Frequency:2.57 GHz Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off
wlan2mon IEEE 802.11bgn Mode:Monitor Frequency:2.57 GHz Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:off
lo no wireless extension
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
root@kali:~# ifconfig wlan2mon down
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
root@kali:~# ifconfig wlan2mon down
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)B)
root@kali:~# ifconfig -a
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
root@kali:~# macchanger --help
GNU MAC Changer
Usage: macchanger [options] device
-h, --help Print this help
-V, --version Print version and exit
-s, --show Print the MAC address and exit
-e, --ending Don't change the vendor bytes
-a, --another Set random vendor MAC of the same kind
-A Set random vendor MAC of any kind
-p, --permanent Reset to original, permanent hardware MAC
-r, --random Set fully random MAC
-l, --list[=keyword] Print known vendors
-b, --bia Pretend to be a burned-in-address
-m, --mac=XX:XX:XX:XX:XX:XX
--mac XX:XX:XX:XX:XX:XX Set the MAC XX:XX:XX:XX:XX:XX
Report bugs to https://github.com/alobbs/macchanger/issues
root@kali:~# macchange -m 00:11:11:11:11:11 wlan2mon
Current MAC: 08:57:00:0c:96:68 (TP-LINK TECHNOLOGIES CO.,LTD.)
Permanent MAC: 08:57:00:0c:96:68 (TP-LINK TECHNOLOGIES CO.,LTD.)
New MAC: 00:11:11:11:11:11 (Intel Corporation)
root@kali:~# ifconfig wlan2mon up
root@kali:~# ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d
inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1
Rx packets:0 errors:0 dropped:0 overruns:0 frame:0
Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet addr. ::1/128 Scope:Host
UP LOOKBACK RUNNING MTU:65536 MetricL:1
Rx packets:20 errors:0 dropped:0 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)
wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)
wlan2mon Link encap:UNSPEC HWaddr 00:11:11:11:11:11-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0
Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
root@kali:~# arieplay-ng -h 00:11:11:11:11:11
No replay interface specified.
"aireplay-ng --help" for help.
AIREPLAY-NG包注入测试
检测网卡是否可以注入包
检测AP的响应时间
回包率反应链路质量
如果有两个无线网卡,可以检测具体可以注入哪种攻击
基本测试检测AP对probe广播的响应
向每AP发30包
网卡成功发送并可接收包的能力
root@kali:~# aireplay-ng --help
Aireplay-ng 1.2 rc2 - (C) 2006-2014 Thomas d'Otreppe
http://www.aircrack-ng.org
usage: aireplay-ng <options> <replay interface>
Filter options:
-b bssid : MAC address, Access Point
-d dmac : MAC address, Destination
-s smac : MAC address, Source
-m len : minimum packet length
-n len : maximum packet length
-u type : frame control, type field
-v subt : frame control, subtype field
-t tods : frame control, To DS bit
-f fromds : frame control, From DS bit
-w iswep : frame control, WEP bit
-D : disable AP detection
Replay options:
-x nbpps : number of packets per second
-p fctrl : set frame control word (hex)
-a bssid : set Access Point MAC address
-c dmac : set Destination MAC address
-h smac : set Source MAC address
-g value : change ring buffer size (default: 8)
-F : choose first matching packet
Fakeauth attack options:
-e essid : set target AP SSID
-o npckts : number of packets per burst (0=auto, default: 1)
-q sec : seconds between keep-alives
-Q : send reassociation requests
-y prga : keystream for shared key auth
-T n : exit after retry fake auth request n time
Arp Replay attack options:
-j : inject FromDS packets
Fragmentation attack options:
-k IP : set destination IP in fragments
-l IP : set source IP in fragments
Test attack options:
-B : activates the bitrate test
Source options:
-i iface : capture packets from this interface
-r file : extract packets from this pcap file
Miscellaneous options:
-R : disable /dev/rtc usage
--ignore-negative-one : if the interface's channel can't be determined,
ignore the mismatch, needed for unpatched cfg80211
Attack modes (numbers can still be used):
--deauth count : deauthenticate 1 or all stations (-0)
--fakeauth delay : fake authentication with AP (-1)
--interactive : interactive frame selection (-2)
--arpreplay : standard ARP-request replay (-3)
--chopchop : decrypt/chopchop WEP packet (-4)
--fragment : generates valid keystream (-5)
--caffe-latte : query a client for new IVs (-6)
--cfrag : fragments against a client (-7)
--migmode : attacks WPA migration mode (-8)
--test : tests injection and quality (-9)
--help : Displays this usage screen
AIREPLAY-NG包注入测试
基本测试
aireplay -9 wlan2mon
向隐藏AP/指定SSID注入
arieplay-ng -9 -e leven -a EC:26:CA:FA:02:DC wlan2mon
root@kali:~# aireplay-ng -9 wlan2mon
10:08:55 Trying broadcast probe requests...
10:08:55 Injection is working!
10:08:57 Found 7 APs
10:08:57 Trying directed probe requests...
10:08:57 EC:26:CA:FA:02:DC - channel: 11 - 'level'
10:08:58 Ping (min/avg/max): 2.306ms/32.381ms/71.026ms Power: -58.57
10:08:58 30/30: 100%
10:08:58 64:09:80:04:18:A2 - channel: 10 - '19e_18A1'
10:08:58 Ping (min/avg/max): 1.435ms/11.855ms/50.074md Power: -69.33
10:08:59 27/30: 90%
root@kali:~# aireplay-ng -9 wlan2mon -e KiFi EC:26:CA:FA:02:DC
19:15:23 Waiting for beacon frame (BSSID: EC:26:CA:DC:29:B6) on channel 11
19:15:23 Trying broadcast probe requests...
19:15:23 Injection is workings...
19:15:25 Found 1 AP
19:15:25 Trying directed probe requests...
19:15:25 EC:26:CA:DC:29:B6 - channel: 11 - 'KiFi'
19:15:25 Ping (min/avg/max): 1.455ms/10.263ms/21.097ms Power: -34.14
19:15:25 29/30: 96%
AIREPLAY-NG包注入测试
card to card注入测试
具体攻击方式
-i作为AP的网卡
5/7 Faild
注入MAC和真正MAC相同时可以正常使用
root@kali:~# aireplay-ng -9 -i wlan0mon wlan2mon
10:56:32 Trying broadcast probe requests...
10:56:33 No Answer...
10:56:33 Found 3 APs
10:56:33 Trying directed probe requests...
10:56:33 64:09:80:04:18:A2 - channel: 10 - '19e_18A1'
10:56:34 Ping (min/avg/max): 1.195ms/20.474ms/102.766ms Power: -49.72
10:56:34 29/30: 96%
10:56:34 Injecion is working!
10:56:34 64:09:80:58:2A:64 - channel: 10 - '19e_Life'
10:56:35 Ping (min/avg/max): 1.122ms/20.051ms/84.037ms Power: -54.57
10:56:35 28/30: 93%
10:56:35 38:59:F9:47:EC:BB - channel: 10 - 'LieBaoWiFi599'
10:56:40 Ping (min/avg/max): 1.700ms/13.009ms/31.799ms Power: -71.71
10:56:40 7/30: 23%
10:56:40 Trying card-to-card injection...
10:56:40 Attack -0: OK
10:56:40 Attack -1 (open): OK
10:56:40 Attack -1 (psk): OK
10:56:40 Attack -2/-3/-4/-6: OK
10:56:43 Attack -5/-7: Failed
- 【安全牛学习笔记】AIREPLAY-NG
- 【安全牛学习笔记】AIRRACK-NG SUITE
- 【安全牛学习笔记】AIRRACK-NG(二)
- 【安全牛学习笔记】 AIRRACK-NG SUITE
- 【安全牛学习笔记】密钥交换、AIRCRACK-NG基础、AIRODUMP-NG排错
- 【安全牛学习笔记】密钥交换、AIRCRACK-NG基础、AIRODUMP-NG排错
- Aircrack-ng之Aireplay-ng命令
- Aircrack-ng之aireplay(Deauthentication)
- kali无线渗透之aireplay-ng
- 数据包注入重放工具aireplay-ng
- Aircrack-ng官方文档翻译[中英对照]---Aireplay-ng
- Aircrack-ng 学习笔记
- 深入理解Aireplay-ng各种攻击及其原理
- 深入理解Aireplay-ng各种攻击及其原理
- 深入理解Aireplay-ng各种攻击及其原理
- Aireplay-ng的6种攻击模式详解
- Aireplay-ng 的 6 种攻击模式详解
- kali无线渗透之Aireplay-ng小谈
- taberror inconsistent use of tabs and spaces in indentation pycharm
- CentOS设置系统时间与网络时间同步
- CentOS7引导Win7
- ccf-有趣的数
- Mysql中查询某一天,某一月,某一年的数据
- 【安全牛学习笔记】AIREPLAY-NG
- 在一个二维数组中,每一行都按照从左到右递增的顺序排序,每一列都按照从上到下递增的顺序排序。请完成一个函数,输入这样的一个二维数组和一个整数,判断数组中是否含有该整数。
- 国际区块链应用联合会 9-11 北京 meetup活动成功举办
- PHP使用之实现弹出消息提示框的两种方法
- c++运算符重载(公司笔试题)
- ubuntu16.04安装lasagne
- Jzoj1321 灯
- Redis集群
- Cenos7安装jdk,tomcat,mysql5.7 零碎笔记