AIRCRACK-NG

Cracking & Recovery

aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a 40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets have been gathered. Also it can attack WPA1/2 networks with some advanced methods or simply by brute force.

It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools. It can also fully use a multiprocessor system to its full power in order to speed up the cracking process.

aircrack-ng is a fork of aircrack, as that project has been stopped by the upstream maintainer.


DOWNLOADS

SYSTEM REQUIREMENTS

RAM : Minimum 512MB (Recommended : 2GB or more)

Storage : 554 KB for Archives, 11.6 MB for GUI zip file.

OS : Windows (with Cygwin), Linux, macOS

Architecture : Supports both 32-bit and 64-bit architectures

Available On : PC


ADDITIONAL INFORMATION

Published By

Thomas d'Otreppe de Bouvette

Release Date

February 2006

Approximate Size

2.5 MB for Terminal Installation

Publisher Info

Aircrack-ng is maintained by Thomas d'Otreppe de Bouvette and a community of contributors

Supported Languages

English

Last Update

May 10, 2022 (Version 1.7)

Programming Language

Written in C

Operating System

Cross-platform

License

GNU General Public License (GPL)

  • Cracks WEP and WPA/WPA2-PSK keys
  • Uses various attack methods, including FMS, KoreK, and PTW
  • Can crack keys without authenticated clients using fragmentation and chopchop attacks

It mainly focuses on 4 areas :

  1. Monitoring : Captures cap, packet, or hash files.
  2. Attacking : Performs deauthentication or creates fake access points.
  3. Testing : Checking the wifi cards or driver capabilities.
  4. Cracking : Various security standards like WEP or WPA PSK.

  1. Cracking WEP keys : Aircrack-ng can crack WEP keys using statistical mathematical analysis.
  2. Cracking WPA/WPA2 PSK keys : Aircrack-ng can perform dictionary attacks to crack WPA/WPA2 PSK keys.
  3. Packet sniffing : Tools like airodump-ng can sniff wireless packets and store them in various formats, allowing compatibility with other software.
  4. Rogue Access Point (AP) : Airbase-ng can create a rogue AP, collecting ARP packets to recover the key when a client tries to reconnect.
  5. Wireless card server : airserv-ng allows multiple wireless programs to use a card independently.
  6. WiFi network security assessment : Aircrack-ng covers various aspects of WiFi security, including detection, packet sniffing, and cracking WEP and WPA/WPA2-PSK keys. It supports raw monitoring mode for 802.11a, 802.11b, and 802.11g traffic and is available for both Linux and Windows.

Aircrack-ng is a comprehensive suite of tools for 802.11 wireless network security auditing and cracking. Here are some examples of its usage :

Capturing Packets

$ airodump-ng -c 6 -w dump wlan0mon : Capture packets on channel 6 using the wireless interface wlan0mon and save them to a file named dump.

$ -c specifies the channel to monitor.

$ -w specifies the output file prefix.

$ wlan0mon is the wireless interface.

Cracking WEP

$ aircrack-ng -b AA:BB:CC:DD:EE:FF -w wordlist.txt dump.cap : Crack WEP encryption using the captured packets in dump.cap, with the BSSID AA:BB:CC:DD:EE:FF, and a wordlist file wordlist.txt.

$ -b specifies the BSSID.

$ -w specifies the wordlist file.

$ dump.cap is the input file containing captured packets.

Cracking WPA/WPA2

$ aircrack-ng -w rockyou.txt -b AA:BB:CC:DD:EE:FF dump.cap : Crack WPA/WPA2 encryption using the captured packets in dump.cap, with the BSSID AA:BB:CC:DD:EE:FF, and a wordlist file rockyou.txt.

$ -w specifies the wordlist file.

$ -b specifies the BSSID.

$ dump.cap is the input file containing captured packets.

Using Precomputed Hashes

$ aircrack-ng -m 2500 -b AA:BB:CC:DD:EE:FF -w hashes.txt dump.cap : Crack WPA/WPA2 encryption using precomputed hashes in hashes.txt, with the BSSID AA:BB:CC:DD:EE:FF, and the captured packets in dump.cap.

$ -m specifies the number of hashes to use.

$ -b specifies the BSSID.

$ -w specifies the hash file.

$ dump.cap is the input file containing captured packets.

Starting WPA Handshake Capture

$ airodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture wlan0mon : Capture WPA handshakes on channel 6, with the BSSID AA:BB:CC:DD:EE:FF, and save them to a file named capture.

$ -c specifies the channel to monitor.

$ --bssid specifies the BSSID.

$ -w specifies the output file prefix.

$ wlan0mon is the wireless interface.

These examples demonstrate various uses of Aircrack-ng, including packet capture, WEP and WPA/WPA2 cracking, and using precomputed hashes. Always ensure you have the necessary permissions and follow local laws and regulations when conducting wireless network security audits.

  • Iwconfig
  • Airmon-Ng
  • Airodump-Ng
  • Aircrack-Ng
  • Aireplay-Ng
  • Airdecap-Ng
  • Airtun-Ng
  • Airolib-Ng
  • Airbase-Ng

Terminal Installation Commands ...
  1. Install Dependencies : Use your package manager to install required tools like autoconf, automake, libtool, and openssl.
  2. Download Aircrack-ng : Get the latest version from the official site.
  3. Compile and Install :
  4. $ tar -zxvf aircrack-ng-<version>.tar.gz

    $ cd aircrack-ng-<version>

    $ autoreconf -i

    $ ./configure

    $ make

    $ sudo make install

  5. Verify Installation : Run aircrack-ng in the terminal.
GUI Installation Steps ...
Linux :
  1. Download Aircrack-ng : Visit the official website and download the latest version of Aircrack-ng.
  2. Install Dependencies : Ensure you have the required dependencies installed, such as Autoconf, Automake, Libtool, OpenSSL development packages, and others listed on the installation guide.
  3. Compile and Install :
    • Extract the downloaded file.
    • Navigate to the extracted folder in your terminal.
    • Run the following commands:

    $ autoreconf -i

    $ ./configure --with-experimental

    $ make

    $ make install

  4. GUI Setup : Aircrack-ng itself doesn't come with a GUI by default, but you can use third-party tools like Fern WiFi Cracker or Wireshark for graphical interfaces.
Windows :
  1. Download Aircrack-ng : Visit the official website and download the Windows installer.
  2. Install Dependencies : Ensure you have WinPcap installed (if not, download it from its official site).
  3. Install Aircrack-ng : Run the installer and follow the prompts.
  4. Verify Installation : Open Command Prompt, type aircrack-ng, and press Enter to confirm it’s installed.
MacOS :
  1. Install Xcode : Download Xcode from the Mac App Store and install it.
  2. Install Command Line Tools : Open Xcode, go to Preferences > Downloads, and install the Command Line Tools.
  3. Install MacPorts : Download and install MacPorts from its official site.
  4. Install Aircrack-ng : Open Terminal and run:sudo port install aircrack-ng
  5. sudo port install aircrack-ng
  6. Verify Installation : Type aircrack-ng in Terminal to check.

Terminal Uninstallation Commands ...
  1. Uninstall via Package Manager (if installed via a package manager) :
    • For Debian/Ubuntu : sudo apt-get remove --purge aircrack-ng
    • For Fedora/CentOS : sudo yum remove aircrack-ng
  2. Manual Removal (if compiled from source) :
    • Navigate to the source directory : cd aircrack-ng-<version>
    • Run the uninstall command : sudo make uninstall
    • Delete any remaining files manually.
GUI Uninstallation Steps ...
Linux :
  1. Using apt (Debian-based systems like Ubuntu, Kali Linux, etc.) Open a terminal and run :
  2. $ sudo apt-get remove --auto-remove aircrack-ng

    This will remove the package along with any dependencies.

  3. Using make uninstall (if installed from source) If you installed Aircrack-ng manually, navigate to its directory :
  4. $ cd /opt/aircrack-ng/

    $ sudo make uninstall

    This will remove the compiled files.

  5. Using package manager (for other distributions)
    • Fedora : sudo dnf remove aircrack-ng
    • Arch Linux : sudo pacman -R aircrack-ng
    • OpenSUSE : sudo zypper remove aircrack-ng
Windows
  1. Locate the Installation Folder : Navigate to the folder where Aircrack-ng was installed ( usually in C:\Program Files or C:\Program Files (x86) ).
  2. Delete the Folder : Manually delete the Aircrack-ng folder.
  3. Remove Environment Varaibles : If you added Aircrack-ng to your system's PATH, remove it :
    • Right-click on "This PC" > Properities > Advanced System Settings > Environment Variables.
    • Find and delete the Aircrack-ng entry under "System Variables."
  4. Optional Cleanup : Use a registery cleaner to remove leftover entries.
MacOS :
  1. Uninstall via Homebrew (if installed using Homebrew) : brew uninstall aircrack-ng
  2. Manual Removal :
    • Delete the Aircrack-ng files from /usr/local/bin or whenever it was installed.
    • Remove any configuration files from ?usr/local/etc or /Library/Application Support.

Copyright © 2025 HACKERSPOT

All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.

Subscribe for more Information
HACKERSPOT

HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.

Contacts

Bapatla, Andhrapradesh, India 237101

bablunannam@gmail.com

+91 7995819235