Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux, FreeBSD, macOS, OpenBSD, and Windows; the Linux version is packaged for OpenWrt and has also been ported to the Android, Zaurus PDA and Maemo platforms; and a proof of concept port has been made to the iPhone.

aircrack-ng
Developer(s)Thomas d'Otreppe de Bouvette
Stable release
1.6 / January 25, 2020 (2020-01-25)[1]
Repository
Written inC
Operating systemCross-platform
TypePacket sniffer and injector; WEP encryption key recovery
LicenseGPL
Websitewww.aircrack-ng.org

In April 2007 a team at the Darmstadt University of Technology in Germany developed a new attack method based on a paper released on the RC4 cipher by Adi Shamir. This new attack, named 'PTW', decreases the number of initialization vectors or IVs needed to decrypt a WEP key and has been included in the aircrack-ng suite since the 0.9 release.

Aircrack-ng is a fork of the original Aircrack project. It can be found as a preinstalled tool in many Linux distributions such as Kali Linux or Parrot, which share common attributes as they are developed under the same project (Debian).

Features

The aircrack-ng software suite includes:

NameDescription
aircrack-ngCracks WEP keys using the Fluhrer, Mantin and Shamir attack (FMS) attack, PTW attack, and dictionary attacks, and WPA/WPA2-PSK using dictionary attacks.
airdecap-ngDecrypts WEP or WPA encrypted capture files with known key.
airmon-ngPlaces different cards in monitor mode.
aireplay-ngPacket injector (Linux, and Windows with CommView drivers).
airodump-ngPacket sniffer: Places air traffic into pcap or IVS files and shows information about networks.
airtun-ngVirtual tunnel interface creator.
packetforge-ngCreates encrypted packets for injection.
ivstoolsTools to merge and convert.
airbase-ngIncorporates techniques for attacking client, as opposed to Access Points.
airdecloak-ngRemoves WEP cloaking from pcap files.
airolib-ngStores and manages ESSID and password lists and compute Pairwise Master Keys.
airserv-ngAllows to access the wireless card from other computers.
buddy-ngThe helper server for easside-ng, run on a remote computer.
easside-ngA tool for communicating to an access point, without the WEP key.
tkiptun-ngWPA/TKIP attack tool.
wesside-ngAutomatic tool for WEP key recovery.
gollark: Also, USB3 and USBC, gigabit etherweb, 4K video, DDR4 RAM and a PCIe slot.
gollark: SBCs are getting ridiculous.
gollark: Unrelatedly, https://www.pine64.org/?page_id=61454
gollark: Yes.
gollark: More great "WHY WOULD YOU DO THIS":```go// A Context carries a deadline, cancelation signal, and request-scoped values// across API boundaries. Its methods are safe for simultaneous use by multiple// goroutines.type Context interface { // Done returns a channel that is closed when this Context is canceled // or times out. Done() <-chan struct{} // Err indicates why this context was canceled, after the Done channel // is closed. Err() error // Deadline returns the time when this Context will be canceled, if any. Deadline() (deadline time.Time, ok bool) // Value returns the value associated with key or nil if none. Value(key interface{}) interface{}}```

See also

References

  1. "Aircrack-ng 1.5.2". Aircrack-ng - Official Aircrack-ng blog (Blog). 2018-12-09. Retrieved 2018-12-09.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.