Aircrack-ng
From Wikipedia, the free encyclopedia
Airodump-ng 0.5 |
|
Developed by | Thomas d'Otreppe |
---|---|
Latest release | 0.9.3 / 2008-02-24 |
Preview release | 1.0-rc3 / 2009-03-26 |
Operating system | Cross-platform |
Type | Packet sniffer and injector; WEP encryption key recovery |
License | GPL |
Website | www.aircrack-ng.org |
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless card whose driver supports raw monitoring mode (for a list, visit the website of the project or [1]) and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux and Windows; the Linux version has been ported to the Zaurus and Maemo platforms, and a proof-of-concept port has been made to the iPhone.
In April 2007 a team at the Darmstadt University of Technology in Germany developed a new attack method based on a paper released on the RC4 cypher by Adi Shamir. This new attack, named 'PTW', decreases the number of initialization vectors or IVs needed to decrypt a WEP key and has been included in the aircrack-ng suite since the 0.9 release.
Aircrack-ng is a fork of the original Aircrack project.
Contents |
[edit] Features
The aircrack-ng software suite includes:
Name | Description |
---|---|
aircrack-ng | Cracks WEP (Brute-force search) and WPA (Dictionary File) keys. |
airdecap-ng | Decrypts WEP or WPA encrypted capture files with known key. |
airmon-ng | Placing different cards in monitor mode. |
aireplay-ng | Packet injector (Linux, and Windows [with Commview drivers]). |
airodump-ng | Packet sniffer: Places air traffic into PCAP or IVS files and shows information about networks. |
airtun-ng | Virtual tunnel interface creator. |
airolib-ng | Stores and manages ESSID and password lists; Increases the KPS of WPA attacks |
packetforge-ng | Create encrypted packets for injection. |
Tools | Tools to merge and convert. |
Tools Coming in the 1.0 Release, these can be used by downloading the latest 1.0 release candidate.
Name | Description |
---|---|
airbase-ng | Incorporates techniques for attacking client, as opposed to Access Points |
airdecloak-ng | removes WEP cloaking from pcap files |
airdriver-ng | Tools for managing wireless drivers |
airolib-ng | stores and manages ESSID and password lists and compute Pairwise Master Keys |
airserv-ng | allows you to access the wireless card from other computers. |
buddy-ng | the helper server for easside-ng, run on a remote computer |
easside-ng | a tool for communicating to an access point, without the WEP key |
tkiptun-ng | WPA/TKIP attack |
wesside-ng | automatic tool for recovering wep key. |
[edit] iPhone/iPod Touch
It is possible to install aircrack-ng on to an iPhone[citation needed]. However, this is not all that impressive or useful since the aircrack-ng program merely takes a file full of sniffed packets and uses the information to crack wep keys[citation needed]. So far there have been no reports of the ability to inject packets from the iPhone even put the iPhone's WiFi card into monitor mode in order to capture packets[citation needed].
[edit] See also
[edit] External links
- Aircrack-ng Homepage
- Aircrack airodump and aireplay tutorial
- Aircrack-ng suite of wireless tools: Videos
- Aircrack-ng (WEP, WPA-PSK crack) on openSUSE10.1
- Aircrack-2.3 on Windows (Wireless WEP crack)
- Aircrack on iPhone
- A list of wireless cards that can go into monitor mode/inject
- Aircrack-ng on BackTrack