Developer(s) | Thomas d'Otreppe de Bouvette |
---|---|
Stable release | |
Repository | |
Written in | C |
Operating system | Cross-platform |
Type | Packet sniffer and injector; WEP encryption key recovery |
License | GPL |
Website | www.aircrack-ng.org |
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Aircrack-ng - Index. A: The Aircrack-ng 64-bit version was specially designed for 64-bit Windows Operating Systems and performed much better on those. The Aircrack-ng 32-bit version was initially intended for 32-bit Windows Operating Systems, but it can also run on 64-bit Windows Operating Systems. Aircrack-ng is an application that builds by HotfuZZ. Aircrack-ng是一个包含了多款工具的套装,我们需要使用里面的: airmon-ng airodump-ng aireplay-ng aircrack-ng. 我的工具是树莓派2B+,无线网卡是360随身wifi2代(MT7601U),之前写过一个安装这个网卡驱动的文章《树莓派 kali linux MT7601U安装》,因为我这个驱动有点特别. Unfortunately, aircrack-ng can’t pause and then resume cracking itself, but it is possible to save and then continue session with John The Ripper. In this small note you’ll find how to save the current state of aircrack-ng and then continue the cracking from where it was stopped. Cool Tip: Crack Wi-Fi access points with WPA/WPA2-PSK easily.
Aircrack-ng Mac big sur android emulator. is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSKcracker and analysis tool for 802.11wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux, FreeBSD, macOS, OpenBSD, and Windows; the Linux version is packaged for OpenWrt and has also been ported to the Android, Zaurus PDA and Maemo platforms; and a proof of concept port has been made to the iPhone.
Ibis paint on mac. In April 2007 a team at the Darmstadt University of Technology in Germany developed a new attack method based on a paper released on the RC4 cipher by Adi Shamir. This new attack, named 'PTW', decreases the number of initialization vectors or IVs needed to decrypt a WEP key and has been included in the aircrack-ng suite since the 0.9 release.
Aircrack-ng is a fork of the original Aircrack project. It can be found as a preinstalled tool in many Linux distributions such as Kali Linux or Parrot, which share common attributes as they are developed under the same project (Debian).
Features[edit]
The aircrack-ng software suite includes:
Name | Description |
---|---|
aircrack-ng | Cracks WEP keys using the Fluhrer, Mantin and Shamir attack (FMS) attack, PTW attack, and dictionary attacks, and WPA/WPA2-PSK using dictionary attacks. |
airdecap-ng | Decrypts WEP or WPA encrypted capture files with known key. |
airmon-ng | Places different cards in monitor mode. |
aireplay-ng | Packet injector (Linux, and Windows with CommView drivers). |
airodump-ng | Packet sniffer: Places air traffic into pcap or IVS files and shows information about networks. |
airtun-ng | Virtual tunnel interface creator. |
packetforge-ng | Creates encrypted packets for injection. |
ivstools | Tools to merge and convert. |
airbase-ng | Incorporates techniques for attacking client, as opposed to Access Points. |
airdecloak-ng | Removes WEP cloaking from pcap files. |
airolib-ng | Stores and manages ESSID and password lists and compute Pairwise Master Keys. |
airserv-ng | Allows to access the wireless card from other computers. |
buddy-ng | The helper server for easside-ng, run on a remote computer. |
easside-ng | A tool for communicating to an access point, without the WEP key. |
tkiptun-ng | WPA/TKIP attack tool. |
wesside-ng | Automatic tool for WEP key recovery. |
See also[edit]
- Kali Linux (Linux distribution for digital forensics and penetration testing)
- BackTrack, its predecessor
References[edit]
Aircrack-ng -j
- ^'Aircrack-ng 1.5.2'. Aircrack-ng - Official Aircrack-ng blog (Blog). 2018-12-09. Retrieved 2018-12-09.CS1 maint: discouraged parameter (link)
External links[edit]
In this new hacking tutorial we will be Piping Crunch with Aircrack-ng so we can get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files. When we pipe the output from Crunch with Aircrack-ng the data will be fed directly into Aircrack-ng instead of a text file. Aircrack-ng will be using the input from Crunch for brute forcing the password. This method will safe us a lot of time and valuable drive space since effective wordlists for brute forcing purposes tend to grow very fast in a short time.
Piping Crunch with Aircrack-ng
After we’ve captured the 4 way handshake, which we will not be covering in this tutorial, we can pipe Crunch with Aircrack-ng to break the password. The following tutorials will teach you how to capture handshakes using the aircrack-ng software suite in Kali Linux:
The following command can be used to start Aircrack-ng with input from Crunch:
Aircrack For Windows
crunch 8 8 | aircrack-ng -e [ESSID] -w – [file path to the .cap file]
Please note that the file paths used in this command are case sensitive and the | sign which is actually piping Crunch with Aircrack-ng.
Crunch Tutorial
Aircrack-ng.org
Crunch in Kali Linux has serveral features to generate passwords from which only one of them is used in this tutorial. The following tutorial is about how to use the different options in Crunch to generate the password list you need, for example a default router password containing 8 letters (like UPC Broadband) or the use of static sequences of text and numbers:
Aircrack-ng
Thanks for reading and do not hesitate to ask any questions related to this hacking tutorial in the comment section :)