
Then at terminal times linux type command "airmon-ng start wlan0" to enable monitor mode on wifi network to know what kind of adapter we use by typing command : Tutorial using Aircrack-ng on Kali Linux 2īefore cracking wifi password first we should have a target wifi that we will crack.įirst, open the Aircrack-ng app on Kali Linux then follow the following command:Īpplications -> Wireless Attacks -> aircrack-ng Placed on PCAP data traffic or IVS files and shows information about the network.
Placing a WiFi network in monitoring mode. To Encrypt WEP or WPA encrypted with an existing key. For WEP and WPA Crack using Dictionary attack keys. This is a feature that can be used on Aircrack-ng : Aircrack-ng works primarily on Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, and Solaris and even eComStation 2. Many GUIs take advantage of this feature. Cracking : Cracking on WEP and WPA2 PSK.Īll tools are command lines that allow for heavy scripting. Testing : Checking WiFi card and driver capability (capture and injection). Attack : Reroute, deauthentication, create fake access point and via packet injection. Monitoring : Packet capture and export data to text files for further processing by third-party applications. Aircrack works on WiFi networks that support monitoring mode and can detect network traffic from 802.11a, 802.11b and 802.11g.Īircrack-ng focuses on different WIFI Security. The program will retry again when there are 15000 packets, and so on.Aircrack-ng is a collection of useful applications for assessing and measuring the level of security on a network consisting of detectors, packet sniffer, crackers and WEP or WPA2 analyzers for WLAN 802.11 networks. If not, the program will tell you to get more packets. If the password is weak enough, then you'll get it in front of you. (in a new terminal)Īircrack-ng name_of_file-01.cap The program will ask which wifi to crack, if there are multiple available. Now, you can use aircrack-ng to crack the password. Crack the wifi If all goes well ,then you'll be sitting in front of your pc, grinning, finally you've got 10000 packets (don't stop the packet capture yet).
Using ARP request replay, we can get 10k packets in a few minutes.ĥ. Just understand how the procedure works (including the next sections), and once you are convinced you know what you are doing, proceed to the next tutorial where we use ARP replay to speed up the rate at which we gets packets. PS: Don't wait too long for this step though. You will have to wait till you have enough data (10000 minimum) Now the captured packets will be stored in name_of_file.cap