Aircrack-ng
From Wikipedia, the free encyclopedia
aircrack-ng | |
---|---|
airodump 0.6 |
|
Developed by | Thomas d'Otreppe |
Latest release | 0.9.3 / February 24, 2008 |
OS | Cross-platform |
Genre | Packet sniffer |
License | GPL |
Website | www.aircrack-ng.org |
Aircrack-ng is a network detector, packet sniffer, WEP and WPA cracker and analysis tool for 802.11 wireless LANs. It works with any wireless card whose driver supports raw monitoring mode (for a list, visit the website of the project or [1]) and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux, Windows and on the Sharp Zaurus. Also a Internet Tablet OS port exists for devices like the N800.
In April 2007 a team at the Darmstadt University of Technology in Germany developed a new attack method based on a paper released on the RC4 cypher by Adi Shamir. This new attack, named 'PTW', decreases the amount of initialization vectors or IVs needed to decrypt a WEP key and has been included in the aircrack-ng suite since the 0.9 release.
Aircrack-ng is a fork of the original Aircrack project.
Contents |
[edit] Features
aircrack-ng has separate parts :
Name | Description |
---|---|
aircrack-ng | Cracks WEP (Brute-force search) and WPA (Dictionary File) keys. |
airdecap-ng | Decrypts WEP or WPA encrypted capture files with known key. |
airmon-ng | Placing different cards in monitor mode. |
aireplay-ng | Packet injection (Linux, and Windows [with Commview drivers]). |
airodump-ng | Places air traffic into .cap file and shows information on networks. |
airtun-ng | Virtual tunnel interface creator. |
airolib-ng | Stores and manages ESSID and password lists; Increases the KPS of WPA attacks |
Tools | Tools to merge and convert. |
[edit] iPhone / iPod Touch
There may be a port of Aircrack for use with the Wi-Fi enabled iPod Touch and iPhone platforms (see video in External Links below). It is unknown if iPods can be put in monitor mode to sniff packets. It can decrypt keys.