Files
documentation/assets/js/71ec7df8.07df7f13.js
github-actions[bot] 952cfaf171 deploy: b0bc28ed0e
2024-12-05 07:31:02 +00:00

1 line
11 KiB
JavaScript

"use strict";(self.webpackChunkdocuments=self.webpackChunkdocuments||[]).push([[8412],{7544:(n,e,s)=>{s.r(e),s.d(e,{assets:()=>t,contentTitle:()=>c,default:()=>h,frontMatter:()=>a,metadata:()=>l,toc:()=>o});var r=s(4848),i=s(8453);const a={sidebar_position:1},c="Aircrack-NG",l={id:"tools/aircrack-ng",title:"Aircrack-NG",description:"\ud83d\udd10 Aircrack-ng: A Complete Guide with Installation on Snigdha OS",source:"@site/docs/tools/aircrack-ng.md",sourceDirName:"tools",slug:"/tools/aircrack-ng",permalink:"/documentation/tools/aircrack-ng",draft:!1,unlisted:!1,editUrl:"https://github.com/Snigdha-OS/documentation/tree/master/docs/tools/aircrack-ng.md",tags:[],version:"current",sidebarPosition:1,frontMatter:{sidebar_position:1},sidebar:"tutorialSidebar",previous:{title:"Tools",permalink:"/documentation/category/tools"},next:{title:"DNS Enum",permalink:"/documentation/tools/dns"}},t={},o=[{value:"\ud83d\udd10 <strong>Aircrack-ng: A Complete Guide with Installation on Snigdha OS</strong>",id:"-aircrack-ng-a-complete-guide-with-installation-on-snigdha-os",level:3},{value:"\ud83d\udee0\ufe0f <strong>How to Install Aircrack-ng on Snigdha OS</strong>",id:"\ufe0f-how-to-install-aircrack-ng-on-snigdha-os",level:3},{value:"\ud83e\uddf0 <strong>Aircrack-ng Tools Overview</strong>",id:"-aircrack-ng-tools-overview",level:3},{value:"\ud83d\udd0d <strong>Example Workflow: Cracking WPA/WPA2</strong>",id:"-example-workflow-cracking-wpawpa2",level:3},{value:"\u26a0\ufe0f <strong>Important Notes</strong>",id:"\ufe0f-important-notes",level:3},{value:"\ud83d\ude80 <strong>Resources and Further Learning</strong>",id:"-resources-and-further-learning",level:3}];function d(n){const e={a:"a",br:"br",code:"code",h1:"h1",h3:"h3",hr:"hr",li:"li",ol:"ol",p:"p",pre:"pre",strong:"strong",ul:"ul",...(0,i.R)(),...n.components};return(0,r.jsxs)(r.Fragment,{children:[(0,r.jsx)(e.h1,{id:"aircrack-ng",children:"Aircrack-NG"}),"\n",(0,r.jsxs)(e.h3,{id:"-aircrack-ng-a-complete-guide-with-installation-on-snigdha-os",children:["\ud83d\udd10 ",(0,r.jsx)(e.strong,{children:"Aircrack-ng: A Complete Guide with Installation on Snigdha OS"})]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Aircrack-ng"})," is a powerful suite of tools used for monitoring, testing, cracking, and securing Wi-Fi networks. This guide will cover how to install Aircrack-ng on Snigdha OS and explain its key tools. Let\u2019s dive in! \ud83d\ude80"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsxs)(e.h3,{id:"\ufe0f-how-to-install-aircrack-ng-on-snigdha-os",children:["\ud83d\udee0\ufe0f ",(0,r.jsx)(e.strong,{children:"How to Install Aircrack-ng on Snigdha OS"})]}),"\n",(0,r.jsxs)(e.ol,{children:["\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Update Your System"}),":\nAlways ensure your system is up-to-date before installing new software:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo pacman -Syu\n"})}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Install Aircrack-ng"}),":\nAircrack-ng is available in the official Snigdha OS repositories:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo pacman -S aircrack-ng\n"})}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Verify Installation"}),":\nCheck that Aircrack-ng is installed correctly by running:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"aircrack-ng --help\n"})}),"\n",(0,r.jsx)(e.p,{children:"If installed successfully, you'll see a list of commands and options. \u2705"}),"\n"]}),"\n"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsxs)(e.h3,{id:"-aircrack-ng-tools-overview",children:["\ud83e\uddf0 ",(0,r.jsx)(e.strong,{children:"Aircrack-ng Tools Overview"})]}),"\n",(0,r.jsx)(e.p,{children:"The Aircrack-ng suite includes several tools for various purposes:"}),"\n",(0,r.jsxs)(e.ol,{children:["\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Airmon-ng (Monitor Mode Enabler) \ud83d\udef0\ufe0f"}),(0,r.jsx)(e.br,{}),"\n","Enables monitor mode on your wireless network interface."]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Usage"}),":"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo airmon-ng start wlan0\n"})}),"\n",(0,r.jsxs)(e.p,{children:["This sets your ",(0,r.jsx)(e.code,{children:"wlan0"})," device to monitor mode, allowing you to capture Wi-Fi traffic."]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Airodump-ng (Packet Capture) \ud83d\udce1"}),(0,r.jsx)(e.br,{}),"\n","Captures packets and displays information about nearby wireless networks."]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Usage"}),":"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo airodump-ng wlan0mon\n"})}),"\n",(0,r.jsxs)(e.p,{children:["Replace ",(0,r.jsx)(e.code,{children:"wlan0mon"})," with your monitor-enabled interface. It displays SSIDs, BSSIDs, channels, and more."]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Aireplay-ng (Packet Injection) \ud83c\udfaf"}),(0,r.jsx)(e.br,{}),"\n","Injects packets to test network security or deauthenticate clients."]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Usage"}),":",(0,r.jsx)(e.br,{}),"\n","Deauthenticate a client to capture a handshake:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon\n"})}),"\n",(0,r.jsxs)(e.ul,{children:["\n",(0,r.jsxs)(e.li,{children:[(0,r.jsx)(e.code,{children:"<BSSID>"}),": MAC address of the target access point."]}),"\n",(0,r.jsxs)(e.li,{children:[(0,r.jsx)(e.code,{children:"<CLIENT_MAC>"}),": MAC address of the client."]}),"\n"]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Aircrack-ng (Password Cracker) \ud83d\udd13"}),(0,r.jsx)(e.br,{}),"\n","Cracks WPA/WPA2 passwords using captured handshakes."]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Usage"}),":"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"aircrack-ng -w wordlist.txt -b <BSSID> capture_file.cap\n"})}),"\n",(0,r.jsxs)(e.ul,{children:["\n",(0,r.jsxs)(e.li,{children:[(0,r.jsx)(e.code,{children:"wordlist.txt"}),": File containing potential passwords."]}),"\n",(0,r.jsxs)(e.li,{children:[(0,r.jsx)(e.code,{children:"capture_file.cap"}),": Packet capture file with the handshake."]}),"\n"]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Airdecap-ng (Decrypt Packets) \ud83d\udd10"}),(0,r.jsx)(e.br,{}),"\n","Decrypts WEP/WPA-encrypted packets after obtaining keys."]}),"\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Usage"}),":"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"airdecap-ng -w <WPA_KEY> capture_file.cap\n"})}),"\n"]}),"\n"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsxs)(e.h3,{id:"-example-workflow-cracking-wpawpa2",children:["\ud83d\udd0d ",(0,r.jsx)(e.strong,{children:"Example Workflow: Cracking WPA/WPA2"})]}),"\n",(0,r.jsxs)(e.ol,{children:["\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Enable Monitor Mode"}),":",(0,r.jsx)(e.br,{}),"\n","Start monitoring with Airmon-ng:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo airmon-ng start wlan0\n"})}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Capture Packets"}),":",(0,r.jsx)(e.br,{}),"\n","Use Airodump-ng to scan for networks:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo airodump-ng wlan0mon\n"})}),"\n",(0,r.jsx)(e.p,{children:"Focus on a target by capturing packets on its channel:"}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo airodump-ng --bssid <BSSID> --channel <CHANNEL> --write capture wlan0mon\n"})}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Deauthenticate a Client"}),":",(0,r.jsx)(e.br,{}),"\n","Force a client to reconnect to capture the WPA handshake:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon\n"})}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Crack the Handshake"}),":",(0,r.jsx)(e.br,{}),"\n","Use Aircrack-ng with a wordlist to crack the password:"]}),"\n",(0,r.jsx)(e.pre,{children:(0,r.jsx)(e.code,{className:"language-bash",children:"aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap\n"})}),"\n"]}),"\n"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsxs)(e.h3,{id:"\ufe0f-important-notes",children:["\u26a0\ufe0f ",(0,r.jsx)(e.strong,{children:"Important Notes"})]}),"\n",(0,r.jsxs)(e.ol,{children:["\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Ethical Use Only"}),":",(0,r.jsx)(e.br,{}),"\n","Always obtain explicit permission before testing any network. Unauthorized use is illegal."]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Hardware Compatibility"}),":",(0,r.jsx)(e.br,{}),"\n","Ensure your wireless card supports monitor mode and packet injection. Popular chipsets include ",(0,r.jsx)(e.strong,{children:"Atheros"})," and ",(0,r.jsx)(e.strong,{children:"Realtek"}),"."]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Wordlist Quality"}),":",(0,r.jsx)(e.br,{}),"\n","Cracking success depends on your wordlist. Use comprehensive wordlists like ",(0,r.jsx)(e.code,{children:"rockyou.txt"})," or generate custom ones."]}),"\n"]}),"\n",(0,r.jsxs)(e.li,{children:["\n",(0,r.jsxs)(e.p,{children:[(0,r.jsx)(e.strong,{children:"Alternative Tools"}),":",(0,r.jsx)(e.br,{}),"\n","Combine Aircrack-ng with tools like ",(0,r.jsx)(e.strong,{children:"hashcat"})," for advanced cracking."]}),"\n"]}),"\n"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsxs)(e.h3,{id:"-resources-and-further-learning",children:["\ud83d\ude80 ",(0,r.jsx)(e.strong,{children:"Resources and Further Learning"})]}),"\n",(0,r.jsxs)(e.ul,{children:["\n",(0,r.jsx)(e.li,{children:(0,r.jsx)(e.a,{href:"https://aircrack-ng.org/",children:"Official Aircrack-ng Documentation"})}),"\n",(0,r.jsx)(e.li,{children:"Tutorials on ethical Wi-Fi testing and network security."}),"\n"]}),"\n",(0,r.jsx)(e.hr,{}),"\n",(0,r.jsx)(e.p,{children:"By following this guide, you\u2019re equipped to install and use Aircrack-ng effectively. Remember to use these tools responsibly and ethically. Happy testing! \ud83c\udf89"})]})}function h(n={}){const{wrapper:e}={...(0,i.R)(),...n.components};return e?(0,r.jsx)(e,{...n,children:(0,r.jsx)(d,{...n})}):d(n)}},8453:(n,e,s)=>{s.d(e,{R:()=>c,x:()=>l});var r=s(6540);const i={},a=r.createContext(i);function c(n){const e=r.useContext(a);return r.useMemo((function(){return"function"==typeof n?n(e):{...e,...n}}),[e,n])}function l(n){let e;return e=n.disableParentContext?"function"==typeof n.components?n.components(i):n.components||i:c(n.components),r.createElement(a.Provider,{value:e},n.children)}}}]);