aircrack-ng
tutorial, run the verified commands and hack WiFi password easily.aircrack-ng
.aircrack-ng
airmon-ng
airodump-ng
on AP channel with filter for BSSID to collect authentication handshakeaireplay-ng
to deauthenticate the wireless clientaircrack-ng
to hack the WiFi password by cracking the authentication handshakeaircrack-ng
from your OS repositories. Download and compile the latest version manually.aircrack-ng
(current version):aircrack-ng
:airmon-ng
has created a new wireless interface called mon0
and enabled on it monitor mode.mon0
.airodump-ng
command:airodump-ng
on AP channel with the filter for BSSID to collect the authentication handshake for the access point we are interested in:Option | Description |
---|---|
-c | The channel for the wireless network |
--bssid | The MAC address of the access point |
-w | The file name prefix for the file which will contain authentication handshake |
mon0 | The wireless interface |
--ignore-negative-one | Fixes the ‘fixed channel : -1’ error message |
airodump-ng
captures a handshake.WPA handshake: 00:11:22:33:44:55
in the top right-hand corner of the screen.airodump-ng
has successfully captured the handshake:airodump-ng
captures a handshake, you can send a message to the wireless client saying that it is no longer associated with the AP.Option | Description |
---|---|
--deauth 100 | The number of de-authenticate frames you want to send (0 for unlimited) |
-a | The MAC address of the access point |
-c | The MAC address of the client |
mon0 | The wireless interface |
--ignore-negative-one | Fixes the ‘fixed channel : -1’ error message |
Option | Description |
---|---|
-w | The name of the dictionary file |
-b | The MAC address of the access point |
WPAcrack.cap | The name of the file that contains the authentication handshake |
aircrack-ng
with “John The Ripper” to pause/resume cracking whenever you want without loosing the progress! Read more →