❎
wiki.hackerlab.cz
  • About me
  • Vulnerability Assessment
  • CLOUD PENTESTING
    • AWS
    • GCP
    • Microsoft Azure
    • Labs
  • REST API - Bypasses and Privilege Escalations
  • Python Virtual Environment (VENV)
  • OSINT & Information Gathering
  • Web Pentesting
    • JavaScript .maps
    • SSRF
    • LDAP Injection
    • Django ORM Exploitation
    • HTTP Request Smuggling
    • Server Side Template Injection (SSTI)
    • Insecure Deserialization
    • Brute force
    • Shell Fu - Oneliners
    • CORS
    • Special Chars & NULL Bytes
    • XSS
    • XXE
    • Nuclei
    • SQL Injection
    • Blind SQL Injection
    • SQLmap
    • NoSQL Injection
    • CRLF Injection
    • Input Validation - Fuzz1
    • HTTP Headers - X-Forwarded
    • Log4j
    • Enumeration with Wordlists
    • Bug Bounty - Web Recon
    • HTTP Proxy Override
    • CSV Injection
    • Windows Forbidden File Names
    • Path Traversal
    • OS Command Injection
    • Open Redirect
    • JWT Tool
    • Burp Extensions - TokenJAR & ATOR
    • Upload RCE
    • GUID and UUIDs
  • Toolset
    • Git - Repo and Tools
    • Docker for Pentesters
  • Infrastructure Pentesting
    • Active Directory (AD)
      • Vulnerable Machines (labs)
      • Pass the hash
      • Azure Active Directory
      • Password Cracking
      • Domain Enumeration
      • LLMNR Poisoning with Responder
      • HTB Forest
      • LDAP
      • WinRM
      • SMB & RPC Enumeration
      • SMB Relay
      • Impacket
      • Bloodhound
      • OWA Exchange Server 2019
      • Active Directory Web Services (ADWS)
      • Active Directory Attacks
    • Mail Server Attacks
    • NFS Enumeration
    • Windows PostExploitation
      • Windows Enumeration
      • Powershell Payloads
      • Add RDP Account & Ride on Meterpreter
    • Dump File Analysis
  • Other Pentest Projects
    • Security Projects
  • WIFI Pentesting
    • Kali Linux - Alpha card AWUS 1900 (VirtualBox)
    • Active Card & Monitor Mode
    • Aircrack-ng Suite
  • Certs
    • Burp Suite Certified Practitioner
  • Linux
    • Network Manager
  • Books
    • The Hacker Playbook 3
Powered by GitBook
On this page
  • Documentation
  • airmon-ng - Monitor Mode
  • Start monitor for all channels
  • Stop Monitor
  • Start Monitor for a specific channel
  • airodump-ng - Display Networks and Associations
  • airodump-ng - Dump Traffic into PCAP (-w)
  • aireplay-ng
  • --deauth count
  • aircrack-ng
  • WPA2-PSK

Was this helpful?

  1. WIFI Pentesting

Aircrack-ng Suite

Setup monitor mode, dump and replay specific frames, and crack it, that's aircrack-ng suite.

PreviousActive Card & Monitor ModeNextCerts

Last updated 4 years ago

Was this helpful?

Documentation

Aircrack-ng suite contains more air* tools, review the documentation on project homepage

airmon-ng - Monitor Mode

airmon-ng <start|stop> <interface> [channel] airmon-ng <check> [kill]

Start monitor for all channels

airmon-ng start wlan0

PHY     Interface       Driver          Chipset
phy0    wlan0           88XXau          Realtek Semiconductor Corp. RTL8814AU 802.11a/b/g/n/ac
                (monitor mode enabled)

Stop Monitor

airmon-ng stop wlan0
PHY     Interface       Driver          Chipset

phy0    wlan0           88XXau          Realtek Semiconductor Corp. RTL8814AU 802.11a/b/g/n/ac
                (monitor mode disabled)

Start Monitor for a specific channel

airmon-ng start wlan0 6

airodump-ng - Display Networks and Associations

airodump-ng <options> <interface>[,<interface>,...]

airodump-ng - Dump Traffic into PCAP (-w)

Capture the network traffic on a specific access point (--bssid) and write into pcap files with (-w) prefix.

airodump-ng --bssid 6E:C7:EC:62:0D:F9 --channel 6 -w PSK wlan0

aireplay-ng

aireplay-ng <options> <replay interface>

--deauth count

You might want to deasociate client to make it associate again in order to capture more handshakes and IVS.

To collect handshakes use --deauth mode to disassociate client form its base station (access point). The next number is a count. It states whether to disassociate one client (1) or all clients (0).

aireplay-ng --deauth 1 -a ACCESS_POINT_MAC -c CLIENT_MAC wlan0

aircrack-ng

Aircrack is the final tool for all attack methods WEP, WPA, WPA2 ...

WPA2-PSK

You have a pcap file with network traffic, bssid MAC address and a wordlist with password candidates.

aircrack-ng -w ./wordlist.txt -b 6E:C7:EC:62:0D:F9 /root/PSK-01.cap    
https://www.aircrack-ng.org