Files
documentation/docs/tools/aircrack-ng.md
2024-12-05 13:00:06 +05:30

4.1 KiB
Raw Blame History

sidebar_position
sidebar_position
1

Aircrack-NG

🔐 Aircrack-ng: A Complete Guide with Installation on Snigdha OS

Aircrack-ng is a powerful suite of tools used for monitoring, testing, cracking, and securing Wi-Fi networks. This guide will cover how to install Aircrack-ng on Snigdha OS and explain its key tools. Lets dive in! 🚀


🛠️ How to Install Aircrack-ng on Snigdha OS

  1. Update Your System: Always ensure your system is up-to-date before installing new software:

    sudo pacman -Syu
    
  2. Install Aircrack-ng: Aircrack-ng is available in the official Snigdha OS repositories:

    sudo pacman -S aircrack-ng
    
  3. Verify Installation: Check that Aircrack-ng is installed correctly by running:

    aircrack-ng --help
    

    If installed successfully, you'll see a list of commands and options.


🧰 Aircrack-ng Tools Overview

The Aircrack-ng suite includes several tools for various purposes:

  1. Airmon-ng (Monitor Mode Enabler) 🛰️
    Enables monitor mode on your wireless network interface.

    Usage:

    sudo airmon-ng start wlan0
    

    This sets your wlan0 device to monitor mode, allowing you to capture Wi-Fi traffic.

  2. Airodump-ng (Packet Capture) 📡
    Captures packets and displays information about nearby wireless networks.

    Usage:

    sudo airodump-ng wlan0mon
    

    Replace wlan0mon with your monitor-enabled interface. It displays SSIDs, BSSIDs, channels, and more.

  3. Aireplay-ng (Packet Injection) 🎯
    Injects packets to test network security or deauthenticate clients.

    Usage:
    Deauthenticate a client to capture a handshake:

    sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon
    
    • <BSSID>: MAC address of the target access point.
    • <CLIENT_MAC>: MAC address of the client.
  4. Aircrack-ng (Password Cracker) 🔓
    Cracks WPA/WPA2 passwords using captured handshakes.

    Usage:

    aircrack-ng -w wordlist.txt -b <BSSID> capture_file.cap
    
    • wordlist.txt: File containing potential passwords.
    • capture_file.cap: Packet capture file with the handshake.
  5. Airdecap-ng (Decrypt Packets) 🔐
    Decrypts WEP/WPA-encrypted packets after obtaining keys.

    Usage:

    airdecap-ng -w <WPA_KEY> capture_file.cap
    

🔍 Example Workflow: Cracking WPA/WPA2

  1. Enable Monitor Mode:
    Start monitoring with Airmon-ng:

    sudo airmon-ng start wlan0
    
  2. Capture Packets:
    Use Airodump-ng to scan for networks:

    sudo airodump-ng wlan0mon
    

    Focus on a target by capturing packets on its channel:

    sudo airodump-ng --bssid <BSSID> --channel <CHANNEL> --write capture wlan0mon
    
  3. Deauthenticate a Client:
    Force a client to reconnect to capture the WPA handshake:

    sudo aireplay-ng --deauth 10 -a <BSSID> -c <CLIENT_MAC> wlan0mon
    
  4. Crack the Handshake:
    Use Aircrack-ng with a wordlist to crack the password:

    aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap
    

⚠️ Important Notes

  1. Ethical Use Only:
    Always obtain explicit permission before testing any network. Unauthorized use is illegal.

  2. Hardware Compatibility:
    Ensure your wireless card supports monitor mode and packet injection. Popular chipsets include Atheros and Realtek.

  3. Wordlist Quality:
    Cracking success depends on your wordlist. Use comprehensive wordlists like rockyou.txt or generate custom ones.

  4. Alternative Tools:
    Combine Aircrack-ng with tools like hashcat for advanced cracking.


🚀 Resources and Further Learning


By following this guide, youre equipped to install and use Aircrack-ng effectively. Remember to use these tools responsibly and ethically. Happy testing! 🎉