Aircrack-ng

From Wikipedia, the free encyclopedia

aircrack-ng

airodump 0.6
Developed by Thomas d'Otreppe
Latest release 0.9.3 / February 24, 2008 (2008-02-24); 108 days ago
OS Cross-platform
Genre Packet sniffer
License GPL
Website www.aircrack-ng.org

Aircrack-ng is a network detector, packet sniffer, WEP and WPA cracker and analysis tool for 802.11 wireless LANs. It works with any wireless card whose driver supports raw monitoring mode (for a list, visit the website of the project or [1]) and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux, Windows and on the Sharp Zaurus. Also a Internet Tablet OS port exists for devices like the N800.

In April 2007 a team at the Darmstadt University of Technology in Germany developed a new attack method based on a paper released on the RC4 cypher by Adi Shamir. This new attack, named 'PTW', decreases the amount of initialization vectors or IVs needed to decrypt a WEP key and has been included in the aircrack-ng suite since the 0.9 release.

Aircrack-ng is a fork of the original Aircrack project.

Contents

[edit] Features

aircrack-ng has separate parts :

Name Description
aircrack-ng Cracks WEP (Brute-force search) and WPA (Dictionary File) keys.
airdecap-ng Decrypts WEP or WPA encrypted capture files with known key.
airmon-ng Placing different cards in monitor mode.
aireplay-ng Packet injection (Linux, and Windows [with Commview drivers]).
airodump-ng Places air traffic into .cap file and shows information on networks.
airtun-ng Virtual tunnel interface creator.
airolib-ng Stores and manages ESSID and password lists; Increases the KPS of WPA attacks
Tools Tools to merge and convert.

[edit] iPhone / iPod Touch

There may be a port of Aircrack for use with the Wi-Fi enabled iPod Touch and iPhone platforms (see video in External Links below). It is unknown if iPods can be put in monitor mode to sniff packets. It can decrypt keys.

[edit] See also

[edit] External links