aircrack-ng

Learn how to use Aircrack-ng for Wi-Fi network security auditing. Discover commands for WEP, WPA/WPA2 cracking with wordlists and databases.

Aircrack-ng

Aircrack-ng Command Examples for Wi-Fi Security Auditing

Aircrack-ng is a powerful suite of tools for auditing wireless network security. It can capture packets and analyze them for vulnerabilities. Below are common command-line examples for using Aircrack-ng to test WEP, WPA, and WPA2 encryption.

WEP Cracking with Essid and Output File

This command targets WEP encryption, specifying the network's ESSID and an output file for the captured keys.

# To crack WEP for a given essid name and store into a file
aircrack-ng -a 1 -e <essid> -l <output file> <.cap or .ivs file(s)>

WPA/WPA2 Cracking with Airolib-ng Database

Utilize a pre-built airolib-ng database to accelerate WPA/WPA2 key cracking.

# To crack WPA/WPA2 from airolib-ng database
aircrack-ng -e <essid> -r <database> <.cap or .ivs file(s)>

WPA/WPA2 Cracking with Wordlist

This is a common method for cracking WPA/WPA2 by attempting keys from a provided wordlist.

# To crack WPA/WPA2 from a wordlist
aircrack-ng -e <essid> -w <wordlist> <.cap or .ivs file(s)>

Cracking Based on BSSID

Target a specific access point using its BSSID for the cracking process.

# To crack a given bssid
aircrack-ng -b <bssid> -l <output file> <.cap or .ivs file(s)>

Cracking with FMS/Korek Method

Employ the FMS/Korek algorithm for enhanced cracking capabilities against a specific BSSID.

# To crack a given bssid using FMS/Korek method
aircrack-ng -K -b <bssid> <.cap or .ivs file(s)>

WEP Cracking and Displaying ASCII Key

Crack WEP and directly view the ASCII representation of the found key.

# To crack a given essid (WEP) and display the ASCII of the key
aircrack-ng -e <essid> -s <.cap of .ivs file(s)>

WEP Cracking and EWSA Project Creation

Generate an EWSA (Electronic Warfare Support Application) project file during WEP key cracking.

# To crack a given essid (WEP) and create a EWSA Project
aircrack-ng -e <essid> -E <EWSA file> <.cap or .ivs file(s)>

Further Resources