Fact-checked by Grok 2 weeks ago

Aircrack-ng

Aircrack-ng is a complete suite of command-line tools designed to assess the security of networks, with a focus on monitoring, attacking, testing, and cracking capabilities for 802.11 wireless LANs. The suite enables packet capture and export for analysis, replay and deauthentication attacks through , testing of card and driver capabilities for capture and injection, and recovery of WEP keys using methods like PTW (introduced in 2007) or FMS/KoreK, as well as /WPA2-PSK keys via dictionary attacks on captured handshakes. It supports optimizations such as , AVX, AVX2, and for accelerated processing, and is compatible with platforms including , Windows, macOS, , , , , and eComStation 2. Originating as an evolution of the earlier Aircrack project, Aircrack-ng was developed starting around 2005 by Christophe Devine and a community of contributors, with key advancements like the PTW method enhancing WEP cracking efficiency by extending statistical analysis. The project has seen active open-source development on , amassing over 4,000 commits by its 1.7 release in May 2022 (as of November 2025, the latest stable version), which added support for 6E, WPA3/OWE detection, and compatibility. Recognized by authoritative bodies like the (CISA) for evaluating wireless password strength, Aircrack-ng emphasizes ethical use in security auditing while warning against unauthorized access.

Development and History

Origins and Fork

The original Aircrack tool was developed by security researcher Christophe Devine and first published in July 2003. It primarily focused on recovering (WEP) keys from captured wireless packets using statistical attacks, such as the Fluhrer-Mantin-Shamir (FMS) method, which exploited weaknesses in the initialization. This tool emerged amid growing awareness of vulnerabilities following the 2001 publication of the FMS attack paper, enabling practical demonstrations of WEP's insecurity for educational and auditing purposes. By 2005, the original Aircrack had reached version 2.41 but exhibited limitations, including poor code modularity, lack of support for emerging protocols like , and restricted platform compatibility primarily to . In response, Thomas d'Otreppe de Bouvette initiated a in 2006, creating Aircrack-ng (Aircrack Next Generation) to address these issues through improved maintainability, modular design, addition of new features such as WPA-PSK cracking, and broader multi-platform support including Windows and BSD variants. The fork aimed to evolve the suite into a more comprehensive, community-driven toolkit for wireless security assessment while preserving the core WEP cracking capabilities. Early development of Aircrack-ng was led by d'Otreppe, with significant contributions from David Adams and a growing community of developers collaborating via hosting. This open-source effort transitioned under the GNU General Public License (GPL) version 2, facilitating ongoing enhancements and distribution across hacking distributions like . In 2018, the project migrated to , further enabling collaborative governance and integration of optimizations like the KoreK and PTW attacks for faster key recovery.

Version History

Aircrack-ng's development began with its initial release as version 0.9 on May 13, 2007, following the project's from Aircrack in February 2006. This version introduced a modular structure for the suite of tools, along with basic support for cracking and enhancements such as the PTW attack for WEP key recovery, injection testing in aireplay-ng, and decryption of IEEE 802.11e headers via airdecap-ng. Early versions like 0.9 also supported foundational attacks such as the Fluhrer-Mantin-Shamir (FMS) method for exploiting WEP vulnerabilities. Subsequent milestone releases built on this foundation with performance improvements and expanded compatibility. Version 1.0, released on September 7, 2009, improved airserv-ng compatibility across 32/64-bit OSes, added support for (Per-Packet Information) capture formats, and fixed issues in WPA handshake detection and cross-platform compatibility, including . Version 1.1, released on April 24, 2010, introduced airdrop-ng for remote packet dropping and addressed buffer overflows in several tools, enhancing overall stability for WPA cracking workflows. Later versions focused on speed optimizations and modern hardware support. Version 1.2, released on April 15, 2018, significantly improved cracking speeds (up to 3x faster in some cases) through better CPU utilization, added support for 802.11n/ac in airodump-ng, and included an autotools-based build system for easier compilation across platforms. Version 1.4, released on September 29, 2018, enhanced packet capture handling with AVL trees for efficient processing of large files, introduced PMKID clientless cracking, and integrated hwloc for optimized performance on multi-core systems, alongside initial WPA3 compatibility. The latest stable release, version 1.7 on May 10, 2022, incorporated over 400 commits addressing bug fixes, , and optimizations for modern hardware, including better error handling in airmon-ng for and newer chipsets, 3 support for scripting tools, and improved static analysis for security. As of November 2025, no major releases have followed 1.7, with development emphasizing ongoing maintenance through minor patches on for compatibility with updated systems, such as the Fedora 1.7-9 rebuild in January 2025. Development practices shifted in the 2010s, notably with the full migration from SourceForge to GitHub on March 11, 2018, to facilitate better collaboration, issue tracking, and continuous integration. The project has since prioritized security auditing features over introducing new exploits, aligning with its role in Wi-Fi penetration testing.

Wi-Fi Security Protocols and Vulnerabilities

WEP

Wired Equivalent Privacy (WEP) was standardized in 1997 as part of the original IEEE 802.11 standard to provide basic confidentiality for wireless local area networks, equivalent to that of a wired network. It employs the RC4 stream cipher for encryption, using a shared secret key of either 40 bits or 104 bits, concatenated with a 24-bit initialization vector (IV) to generate a per-packet keystream. The protocol appends a CRC-32 checksum as an integrity check vector (ICV) to each packet before encryption, aiming to protect against eavesdropping and unauthorized access. However, WEP's design was rushed and lacked robust cryptographic review, leading to fundamental flaws that rendered it insecure from the outset. Key weaknesses in WEP include the use of a short, static that is sent in , enabling rapid exhaustion of the 24-bit IV space (approximately 16 million possible values) and key reuse across packets, which exposes the keystream to XOR-based attacks. The CRC-32 integrity mechanism is a non-cryptographic vulnerable to bit-flipping attacks, where an adversary can alter bits and recompute the ICV without knowledge of the key, allowing packet modification. Additionally, WEP provides no replay protection, permitting attackers to resend captured packets indefinitely without detection. These issues, combined with RC4's key scheduling vulnerabilities, facilitate both passive and active exploitation. Major attacks exploiting these flaws began with the Fluhrer-Mantin-Shamir (FMS) attack in 2001, which recovers the key by collecting weak s that bias RC4's initial keystream output, typically requiring around 5 million s for a 40-bit key. In 2004, KoreK's statistical attacks improved on FMS by leveraging additional correlations, reducing the required s to approximately 500,000 for reliable key recovery. The same year, KoreK's Chopchop attack enabled byte-by-byte decryption of a single packet by iteratively truncating it, guessing the last byte, and verifying via ICV, exploiting RC4's malleability and the weak integrity check—one byte per successfully injected packet. By 2007, the Pyshkin-Tews-Weinmann (PTW) attack further optimized key recovery, succeeding with about 85,000 s at 95% probability, independent of weak reliance. The declared WEP insecure in 2004 due to these vulnerabilities, recommending immediate transition to . By 2006, with certification becoming mandatory, WEP was fully deprecated in standards, prohibiting its use in new certified devices. Despite this, legacy hardware may still support WEP, perpetuating risks. Aircrack-ng tools target WEP by capturing IVs and applying these statistical methods or dictionary attacks on weak keys, demonstrating the protocol's practical breakability in educational and testing contexts.

WPA and WPA2

Wi-Fi Protected Access (WPA) was introduced in 2003 by the as an interim enhancement to address the severe vulnerabilities in the (WEP) protocol. It employs the (TKIP), which builds on the used in WEP but incorporates per-packet key mixing and a 48-bit to prevent key reuse and improve resistance to certain attacks. WPA supports (PSK) mode, allowing straightforward deployment in home and small office environments without requiring authentication infrastructure. WPA2, formally ratified in 2004 as part of the IEEE 802.11i standard, became mandatory for all certified devices starting March 13, 2006. It introduces the Counter Mode with Cipher Block Chaining Protocol (CCMP), which uses the () in for robust , , and , effectively replacing TKIP as the preferred method while maintaining with legacy devices. This shift to AES-CCMP provided significantly stronger cryptographic protections compared to TKIP's RC4-based approach. Despite these advancements, both protocols retain exploitable weaknesses relevant to tools like Aircrack-ng. In with TKIP, the Beck-Tews , disclosed in 2008, exploits weaknesses in the protocol's message integrity check and key derivation to decrypt broadcast packets such as requests and inject forged packets, potentially enabling further network reconnaissance or disruption without full key recovery. For , the Key Reinstallation (KRACK), revealed in 2017, targets flaws in the 4-way handshake process by forcing reuse through manipulated packet retransmissions, allowing attackers to replay encrypted frames, decrypt select traffic like content, and potentially hijack sessions. Both protocols in PSK mode are also susceptible to offline or brute-force attacks on weak passphrases, which require capturing the authentication handshake to test candidate keys computationally. WPA3, announced by the in June 2018, advances security further by mandating (SAE) for PSK authentication, which resists offline attacks through a dragonfly key exchange that protects even weak passwords. However, Aircrack-ng's capabilities remain centered on exploiting WPA and WPA2-PSK vulnerabilities via handshake capture and cracking, with no native support for WPA3's enhanced mechanisms.

Timeline of Cracking Attacks

The timeline of cracking attacks on Wi-Fi security protocols highlights key vulnerabilities exploited by researchers, with Aircrack-ng playing a pivotal role in implementing and refining these techniques for auditing purposes. In 2001, the Fluhrer, Mantin, and Shamir (FMS) attack was published, revealing weaknesses in the key scheduling algorithm used in WEP, allowing key recovery through the collection of weak initialization vectors (IVs) from broadcast packets. This statistical attack laid the for practical WEP cracking tools, and Aircrack-ng incorporated an of FMS from its early versions to enable passive key recovery with sufficient captured traffic. By 2004, refinements to WEP cracking emerged alongside the introduction of WPA. The KoreK attacks, developed by an anonymous researcher known as KoreK, optimized the FMS method by identifying additional weak IV classes, significantly reducing the number of packets needed for key recovery to around 500,000–1,000,000. Concurrently, the Chopchop attack, detailed on security forums, enabled interactive decryption of WEP packets byte-by-byte without the full key, exploiting the protocol's CRC-32 checksum vulnerability. That same year, the Wi-Fi Alliance introduced WPA with TKIP to mitigate WEP flaws, but early analyses revealed TKIP's Michael MIC weaknesses, paving the way for future exploits. Aircrack-ng integrated both KoreK optimizations and Chopchop support in subsequent releases, enhancing its efficiency for WEP audits. In 2007, the PTW attack further accelerated WEP key recovery, requiring as few as 40,000 packets for a 104-bit key with 50% success probability, by improving statistical biases in keystreams and incorporating replay techniques. Developed by Erik Tews, Ralf-Philipp Weinmann, and Andrey Pyshkin, PTW addressed limitations in prior methods under noisy conditions. Aircrack-ng version 1.0, released that year, adopted PTW as its default WEP cracking algorithm, marking a major update in performance. The first practical attacks on via TKIP vulnerabilities appeared in , extending WEP techniques like Chopchop to decrypt packets and forge traffic, though limited by TKIP countermeasures such as extended IVs and extensions. Researchers Erik Tews and demonstrated these in a whitepaper, enabling partial but not full key recovery without additional flaws. Aircrack-ng updated its suite to support TKIP-specific replay and fragmentation attacks, aligning with these discoveries for testing deployments. A significant WPA2 vulnerability emerged in 2017 with the disclosure of the Key Reinstallation Attack (), which exploited flaws in the 4-way handshake to reinstall encryption keys, allowing nonce reuse and decryption of traffic or injection of malicious packets. Discovered by Mathy Vanhoef, affected nearly all WPA2 devices but did not compromise the pairwise master key itself, prompting widespread patches. While Aircrack-ng did not directly implement due to its active nature requiring client-side manipulation, the suite's tools like aireplay-ng facilitated demonstrations and defenses against such reinstallation risks. Into the 2020s, cracking efforts shifted toward offline dictionary and brute-force attacks on WPA2-PSK, leveraging captured handshakes without new protocol-level exploits by 2025, as WPA3 adoption grew. Optimizations focused on GPU acceleration, with tools processing billions of password guesses per second using frameworks like , emphasizing the importance of strong passphrases over inherent protocol weaknesses. Aircrack-ng continued evolving with support for WPA/WPA2 handshakes and integrations for GPU offloading via external libraries, maintaining its relevance for assessments amid these computational advances.

Core Tools

aircrack-ng

Aircrack-ng is the flagship tool in the Aircrack-ng suite, designed primarily for recovering WEP encryption keys through statistical attacks such as FMS, KoreK, and PTW, as well as cracking /WPA2 (PSK) passphrases using or brute-force methods on captured handshakes. It processes offline packet captures to exploit weaknesses in the stream cipher used by WEP and the key derivation in /WPA2-PSK, enabling key extraction without real-time network interaction. The tool requires input in the form of .cap files containing sufficient captured packets, typically generated by airodump-ng; for WEP cracking, this includes a minimum number of initialization vectors (IVs) paired with encrypted data packets, while /WPA2 cracking needs at least the four-way (such as EAPOL messages 2/3 or 3/4). The FMS algorithm identifies weak IVs that allow setting up a over GF(2) to solve for the key bytes, exploiting predictable states from specific IV sequences. KoreK builds on this by applying statistical correlations derived from empirical analysis of biases, resembling a approach to refine key candidates and accelerate recovery. The PTW method enhances efficiency by leveraging bitwise correlations in keystream bytes conditioned on known like packets, reducing the required packet count for high success probability. For /WPA2-PSK, aircrack-ng tests candidate passphrases by computing the pairwise master key () via PBKDF2-HMAC-SHA1 iterations using the network SSID and passphrase, deriving the pairwise transient key (PTK), and verifying the message integrity code () against the captured . Upon successful cracking, aircrack-ng outputs the recovered WEP key in format (e.g., for 40/104-bit keys) or the WPA/WPA2 in ASCII, along with derived keying material if applicable. For example, the PTW method achieves approximately 50% success probability with around 40,000 IVs for 104-bit keys, requiring about 85,000 IVs for 95% success; fewer IVs suffice for 64-bit keys. WPA/WPA2 success depends heavily on the strength and quality, with no guaranteed recovery for complex keys. Limitations include high computational demands, particularly for exhaustive WPA/WPA2 searches on modern hardware, and lack of support for WPA3, which employs (SAE) instead of PSK handshakes.

aireplay-ng

Aireplay-ng is a command-line tool within the Aircrack-ng suite designed for injecting and replaying wireless frames to facilitate the assessment of . It primarily generates artificial traffic to accelerate the capture of data needed for cracking encryption keys, such as WEP initialization vectors (IVs) or handshakes, by exploiting vulnerabilities in 802.11 protocols. The tool operates in on compatible wireless interfaces, allowing it to forge and transmit packets without association to the target network. The core functions of aireplay-ng include for forging frames and replaying captured packets to amplify network traffic. It supports deauthentication and disassociation attacks, which send forged management frames to disconnect clients from an access point, forcing reconnections that reveal /WPA2 handshakes for offline cracking. For WEP networks, aireplay-ng enables replay attacks by capturing and reinjecting request packets, which generates a high volume of encrypted traffic containing unique IVs essential for key recovery. Additionally, it performs chopchop attacks, which decrypt WEP packets byte-by-byte through repeated injection and analysis, though this method is slower and requires no prior knowledge of addresses. Usage of aireplay-ng requires a wireless interface in , typically enabled via airmon-ng, to transmit frames effectively. Common command options include -0 or --deauth for deauthentication floods (e.g., aireplay-ng -0 5 -a <BSSID> -c <client MAC> mon0 to send five deauth packets), and -3 or --arpreplay for -based traffic amplification (e.g., aireplay-ng -3 -b <BSSID> -h <client MAC> mon0 using a captured packet). Other parameters control injection rate with -x (packets per second) and target specifics like BSSID (-b) or client MAC (-c), ensuring precise attacks while minimizing detection. Interactive packet selection is available in -2 mode for manual replay, and -9 tests injection capability before full attacks. Aireplay-ng significantly accelerates WEP cracking by increasing the rate of IV collection through active injection, reducing the time from hours of passive sniffing to minutes of targeted replay. For WPA/WPA2, its deauthentication capability is essential to capture the four-way required for or brute-force attacks in aircrack-ng. Effectiveness depends on the wireless card's injection rate, which can be optimized by setting higher transmission rates (e.g., via iwconfig). Hardware compatibility is crucial, as aireplay-ng requires cards supporting raw packet injection and . Atheros chipsets, such as the AR9271 found in USB adapters like the ALFA AWUS036NHA, provide reliable performance with kernel/mac80211 drivers, enabling high injection rates up to 500 packets per second. Other supported examples include RT3070 and certain variants, though success varies by driver version and firmware.

airodump-ng

Airodump-ng is a packet sniffer and analyzer within the Aircrack-ng suite, designed for passive monitoring and capture of traffic to support . It operates by capturing raw 802.11 frames, including beacons, packets, and management frames such as probe responses and association requests, while monitoring 2.4 GHz channels by default with automatic hopping to multiple frequencies. The tool displays information on access points (APs) and clients, including ESSIDs, BSSIDs, signal strength (PWR), receive quality (RXQ), number of beacons and packets, , and connected clients' addresses, power levels, probe requests, and rates. It also detects types, such as WEP, , WPA2, or WPA3, along with ciphers (e.g., TKIP, CCMP) and methods (e.g., PSK). The captured data is saved in multiple formats for further analysis, with pcap-compatible .cap files providing full packet captures suitable for tools like . Other outputs include .csv files detailing AP and client information, .kismet.csv for compatibility with wireless intrusion detection systems, and .ivs files exporting only initialization vectors (IVs) for WEP analysis. Additional formats encompass .gps for location data and .kismet.netxml for exports. These files enable offline examination of network structures and traffic patterns. Key command-line options allow customization of airodump-ng's behavior, such as --channel (or -c) to fix monitoring on specific (e.g., -c 1,6,11) or enable hopping intervals via -f <msecs>, --bssid to filter captures to a single AP's (e.g., --bssid 00:14:6C:7A:41:20), and --write (or -w) to specify a for output (e.g., -w capture). The --ivs option streamlines WEP IV collection by saving only relevant , reducing file sizes for targeted . Enhancements include GPS integration through --gpsd, which logs coordinates from a GPS receiver into .gps files for mapping network locations, and automatic detection of WPA handshakes in real-time console output (e.g., alerting "WPA handshake: "). Common use cases involve identifying potential targets by listing nearby networks and clients, capturing sufficient IVs for WEP or handshakes for WPA/WPA2 analysis, and providing live assessments via interactive console features like sorting columns with [s]. Captured .cap or .ivs files from airodump-ng can subsequently be processed by aircrack-ng for key cracking.

Attack and Automation Tools

airbase-ng

airbase-ng is a versatile tool within the Aircrack-ng suite designed to create rogue access points (APs) that simulate legitimate networks, thereby luring client devices to associate with them for the purpose of conducting targeted attacks on those clients rather than the AP itself. By emulating various network configurations, including open , WEP-encrypted networks, and /WPA2 setups, airbase-ng enables the generation of deceptive beacons and probe responses to attract clients, even those configured for hidden SSIDs via the -X option. This client-focused approach facilitates the capture of authentication materials and traffic without directly targeting an existing AP, distinguishing it from tools that inject packets into live networks. The tool supports several specific attacks that exploit client vulnerabilities to recover keys or data. For WEP networks, airbase-ng implements the Caffe Latte attack using the -L option, which leverages gratuitous requests from associating clients to generate sufficient initialization vectors (IVs) for recovery, even without access to the original . Similarly, the Hirte attack, enabled by the -N option, extends this by amplifying weak IVs through fragmentation of any captured or packets from the client, allowing extraction in scenarios where the is unavailable. For WPA/WPA2, airbase-ng can force client associations to capture the four-way by configuring appropriate tags (e.g., -z 2 for WPA-TKIP or -Z 4 for WPA2-CCMP), generating the necessary traffic to prompt re-authentication. Key command-line options allow precise control over the rogue AP's behavior, such as -e <ESSID> to set the network name, -c <channel> to specify the operating , -w <WEP key> for in WEP mode, and -a <BSSID> to define the fake AP's . Additional parameters like -s enforce shared for WEP, while -P enables responses to all probe requests to increase client attraction, and -x <nbpps> sets the packet transmission rate (default 100 packets per second) to simulate active traffic. Usage typically involves running airbase-ng <options> <monitor interface>, such as airbase-ng -c 9 -e "teddy" -W 1 mon0, which creates a WEP-enabled AP on channel 9 named "teddy". Output from airbase-ng includes real-time console displays of client associations, probe requests, and encryption details, alongside the creation of a tap interface (e.g., at0) for handling decrypted or routed packets. Captured frames, including handshakes and attack-generated traffic, can be saved to .cap files using the -F <prefix> option for subsequent analysis or cracking with other Aircrack-ng tools. Advanced features extend airbase-ng's utility for complex scenarios, including support for multiple via --bssids <file> to load a list of BSSIDs for simultaneous , and beacon flooding for denial-of-service () effects by overwhelming clients with fake network advertisements using options like -P combined with -C <seconds> to and beacon multiple ESSIDs. It also supports ad-hoc mode (-A) for simulations and external packet processing (-Y) to integrate with custom scripts or tools for enhanced traffic manipulation.

airmon-ng

airmon-ng is a command-line utility within the Aircrack-ng suite designed to manage network interfaces, primarily by enabling and disabling to facilitate auditing. It also handles the detection of interfering processes and provides diagnostic information about supported s and drivers. Without arguments, running airmon-ng displays the current status of interfaces, including their mode, details, and driver information. The core function of airmon-ng is to start or stop on a specified , which allows the to passively capture all traffic without associating with a network. For instance, executing airmon-ng start wlan0 creates a new virtual named wlan0mon (or mon0 in some configurations), enabling 802.11 capture. It automatically checks for and warns about processes that may interfere with , such as or dhclient, which can disrupt or capture. To mitigate these, airmon-ng can kill such processes upon request. Additionally, it detects common chipsets, including Atheros (e.g., AR9271 with ath9k driver) and (e.g., RT3070 with rt2800usb driver), ensuring compatibility before mode switching. Key commands include airmon-ng start <interface> [channel] to initiate monitor mode on the specified channel, airmon-ng stop <interface> to revert to managed mode and remove the monitor interface, and airmon-ng restart <interface> for a full cycle of stopping and restarting. The airmon-ng check command lists potentially problematic processes like , while airmon-ng check kill terminates them automatically to prevent conflicts. For debugging, options such as --verbose or --debug provide detailed output on interface operations and errors. airmon-ng requires root privileges to modify kernel-level interface settings and relies on compatible wireless drivers that support monitor mode, such as ath9k for Atheros chipsets or rtl8187 for devices. Without these, attempts to enable will fail, often indicated by error messages in the output. In troubleshooting scenarios, airmon-ng addresses common issues by automatically killing interfering daemons like during mode activation. It also supports the creation and deletion of virtual interfaces; lingering monitor interfaces can be removed manually using iw dev <[interface](/page/Interface)> del if needed. For driver-related problems, reloading modules (e.g., rmmod ath9k; [modprobe](/page/Modprobe) ath9k) may resolve detection failures. As a foundational tool in the Aircrack-ng suite, airmon-ng serves as a prerequisite for all packet capture and injection operations, preparing interfaces for use by subsequent tools in assessments.

besside-ng

Besside-ng is an automated within the Aircrack-ng suite designed to crack WEP-encrypted networks and capture /WPA2 handshakes without requiring manual intervention from the user. Developed by Andrea Bittau, it builds on concepts from earlier tools like Wesside-ng but extends support to encryption, enabling it to target both legacy and modern security protocols in range. It is an experimental that requires enabling experimental features during compilation (e.g., using --with-experimental flag). It requires a compatible interface capable of . The workflow of besside-ng begins with scanning for nearby access points (APs) using the specified wireless interface in . Upon detecting a WEP , it automatically associates with the AP, injects packets to generate initialization vectors (IVs), and accumulates sufficient data for on-the-fly cracking using integrated aircrack-ng algorithms. For WPA/WPA2 networks, it monitors for clients, performs deauthentication attacks to force exchanges, and logs the resulting 4-way handshakes. The tool handles , injection, and capture seamlessly, directing output to log files and packet captures while continuing to scan other networks in parallel. This automation reduces the need for separate commands, making it suitable for testing in dynamic environments. It internally leverages aireplay-ng for and deauthentication tasks. Besside-ng operates in two primary modes: full automatic mode, which targets both WEP and networks by default, and WPA-only mode activated via the -W option to focus exclusively on capture without attempting WEP cracks. In mode, it can optionally upload captured handshakes to a remote like wpa.darkircop.org for dictionary-based cracking and feasibility analysis, providing statistics on strength. These modes allow users to tailor the tool for specific assessments, such as rapid WEP exploitation or offline analysis preparation. Key command-line options include:
  • -b <target mac>: Specifies a target BSSID to focus attacks on a single .
  • -s <WPA server>: Defines the upload server for handshake processing (default: wpa.darkircop.org).
  • -c <chan>: Locks scanning to a specific to optimize for known networks.
  • -p <pps>: Sets the packets-per-second rate for injection, balancing speed and detectability.
  • -W: Enables -only mode.
  • -v: Activates verbose logging for detailed output.
  • -h: Displays the help screen.
Usage follows the syntax besside-ng [options] <interface>, where the interface must be pre-configured in via airmon-ng. Output from besside-ng includes a primary log file named besside.log, which records details such as SSID, recovered WEP keys in and ASCII formats, BSSID, , and type for each cracked network. For WPA captures, it generates .cap files containing handshakes, suitable for later processing with tools like aircrack-ng or external dictionaries. Successful WEP cracks can occur in minutes under good signal conditions and sufficient client traffic, often yielding keys after capturing 10,000–50,000 IVs depending on the network's activity. WPA outputs are stored for offline use, with upload results providing estimated cracking times based on passphrase complexity. Limitations of besside-ng include its dependence on hardware supporting reliable , such as certain Atheros or chipsets, which may fail on incompatible devices leading to incomplete captures. For WPA2 networks with strong passphrases (e.g., 12+ characters mixing cases and symbols), capture succeeds but cracking remains computationally intensive and often requires substantial resources or GPU acceleration beyond the tool's scope. It performs less effectively in low-traffic environments where client associations are sparse, and the optional upload service may introduce concerns or downtime risks.

Supporting Utilities

airolib-ng

Airolib-ng is a utility in the Aircrack-ng suite that facilitates the precomputation and management of Pairwise Master Keys (PMKs) for accelerating /WPA2-PSK dictionary-based attacks on captured handshakes. It operates by storing lists of network identifiers (ESSIDs) and potential passphrases in a database, then deriving PMKs for each ESSID-password pair to enable rapid verification during cracking without recomputing expensive hashes . This tool addresses the computational bottleneck in /WPA2 cracking, where generating PMKs traditionally slows down brute-force or dictionary attempts. The core process begins with importing ESSID and password lists into the database using the import command, such as airolib-ng <database> import passwd <wordlist_file> for passphrases or import essid <essid_file> for network names. PMKs are then computed via the batch subcommand, which applies the PBKDF2-HMAC-SHA1 with 4096 iterations per pair—a standard derived from the WPA2-PSK —to produce 256-bit keys. Users can verify the integrity of these precomputed PMKs using the test command, optionally with the all flag to delete invalid entries and optimize the database. Additional operations include cleaning the database with clean to reduce size and check consistency, exporting to formats like coWPAtty via export cowpatty, or querying statistics with info. For storage, airolib-ng employs an SQLite3 database (requiring version 3.3.17 or later), which efficiently handles large collections of ESSID-password combinations and their associated PMKs with minimal overhead across platforms. The ESSID serves as the salt in the derivation, allowing support for custom or multiple network-specific tables within a single database. This structure enables distributed precomputation, where PMKs can be generated on multiple systems and merged. By precomputing PMKs, airolib-ng significantly reduces cracking times; for instance, it enables aircrack-ng to test over 50,000 passwords per second against a captured , transforming what might take hours into seconds for common passphrases. It integrates seamlessly with aircrack-ng by specifying the database path with the -r option, such as aircrack-ng -r <database> <capture_file>, allowing direct use of the rainbow tables for efficient dictionary attacks on /WPA2 handshakes.

packetforge-ng

Packetforge-ng is a utility within the Aircrack-ng suite designed to forge custom 802.11 packets, particularly for use in penetration testing and assessments. It enables the creation of encrypted packets from templates or modifications to existing captures, ensuring they mimic legitimate traffic to facilitate injection attacks. By leveraging pseudorandom generation algorithms (PRGA) derived from prior captures, such as those obtained via fragmentation or chop-chop attacks, packetforge-ng produces packets that appear authentic to target networks, including proper 802.11 headers, addresses, and flags. The tool's core capabilities include generating specific packet types: ARP requests (mode -0 or --arp), UDP packets (mode -1 or --udp), ICMP packets (mode -2 or --icmp), null packets (mode -3 or --null), and custom packets (mode -9 or --custom) based on user-defined payloads or modified input files. For custom packets, it can alter existing captures by applying PRGA keystreams to encrypt or re-encrypt payloads while preserving or adjusting layer 2 and 3 details. It supports fragmentation by utilizing PRGA files from aireplay-ng's fragmentation mode, allowing the creation of fragmented packets that can solicit responses from access points. This precision in handling frame control words, FromDS/ToDS bits, and WEP options ensures the forged packets integrate seamlessly with 802.11 requirements. Usage of packetforge-ng follows the syntax packetforge-ng <mode> <options>, where modes specify the packet type and options configure details like MAC addresses (-a for BSSID, -h for source MAC, -c for destination MAC), IP addresses (-k for destination IP:port, -l for source IP:port), TTL (-t), and file inputs/outputs (-r for reading from a raw or pcap file, -y for PRGA file, -w for writing to a pcap output file). The -e option disables WEP encryption if needed, while -p sets the frame control word in hexadecimal for fine-tuned header manipulation. For example, to forge an ARP request packet, one might use: packetforge-ng -0 -a 00:14:6C:7E:40:80 -h 00:0F:B5:AB:CB:9D -k 192.168.1.100 -l 192.168.1.1 -y fragment-0124-161129.xor -w arp-request.cap, which sets the AP and source MACs, destination and source IPs, applies the PRGA keystream, and outputs a pcap file. Similarly, for a custom packet from an input capture: packetforge-ng -9 -r input.cap -y keystream.xor -w output.cap. These commands allow users to build packets with tailored payloads, such as short null packets for deauthentication testing (packetforge-ng -3 -s 42 -a BSSID -h SMAC -w short-packet.cap -y fragment.xor). In attack applications, packetforge-ng is primarily used to craft requests that provoke responses from target devices, thereby generating initialization vectors () for WEP key cracking or for further analysis. For instance, forged requests can elicit ARP replies from clients or points, accelerating IV collection in WEP networks by injecting the packets via aireplay-ng. It supports scenarios requiring authenticated-looking , such as replaying modified captures to test network defenses or simulate client associations. The resulting forged files are directly compatible with injection tools like aireplay-ng for transmission over monitored interfaces. Output files can be inspected with utilities like to verify structure before deployment. Note that packetforge-ng is optimized for WEP-encrypted environments and requires a valid PRGA file for ; it avoids unnecessary bit manipulations like FromDS/ToDS toggles unless specified.

wpaclean

wpaclean is a utility within the Aircrack-ng suite designed to filter and clean wireless packet capture files, specifically targeting /WPA2 handshake data for subsequent analysis and cracking processes. It processes input .cap files by extracting only the essential packets required for key recovery, namely the 4-way EAPOL packets and associated frames from the access point, while discarding irrelevant traffic such as data frames, management frames unrelated to , duplicates, and general noise. This selective extraction ensures that the output file contains streamlined data, making it suitable for input into cracking tools like aircrack-ng. The process begins with providing one or more input capture files obtained from tools like airodump-ng, along with a specified output filename, using the basic syntax: wpaclean <output.cap> <input1.cap> [input2.cap ...]. wpaclean automatically detects and isolates complete or partial 4-way handshakes by analyzing the EAPOL sequence between the client and access point, as well as relevant beacons that provide parameters like SSID and settings. It handles multiple input files by merging and filtering them into a single, cleaned output file, which significantly reduces the overall file size—often by a substantial margin, as extraneous packets are removed—thereby optimizing and for resource-constrained environments. For instance, in scenarios involving large captures from prolonged sessions, this filtering can eliminate gigabytes of irrelevant , focusing solely on authentication-related elements. By preparing cleaned capture files, wpaclean facilitates faster execution of dictionary or brute-force attacks on WPA2 pre-shared keys in aircrack-ng, as the reduced minimizes overhead and potential errors from noisy inputs. This preprocessing step is particularly valuable in penetration testing workflows, where post-capture refinement ensures that only viable proceeds to cracking, allowing users to verify the presence of necessary EAPOL messages (messages 1 through 4) without sifting through voluminous raw traffic. In practice, after capturing potential handshakes during a , running wpaclean on the resulting files prepares them directly for key recovery attempts, enhancing the overall efficacy of security assessments.

References

  1. [1]
    Aircrack-ng
    Description. Aircrack- ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security:.How to Crack WPA/WPA2DownloadsWikiMain documentationTutorial: Getting Started
  2. [2]
    aircrack-ng [Aircrack-ng]
    ### History, Origins, Development, and Key Milestones of Aircrack-ng
  3. [3]
    aircrack-ng/aircrack-ng: WiFi security auditing tools suite - GitHub
    Testing: Checking WiFi cards and driver capabilities (capture and injection). Cracking: WEP and WPA PSK (WPA 1 and 2). All tools are command line which allows ...
  4. [4]
    Aircrack-ng 1.7
    May 10, 2022 · Besside-ng now supports and detects all channels in 5GHz in Auto ... Airmon-ng: Document frequency usage; Airmon-ng: Add a sleep to help ...
  5. [5]
    Aircrack-ng - CISA
    Aircrack-ng a suite of tools to assess WiFi network security including: monitoring, attacking, testing, and cracking. The suite tests the strength of ...
  6. [6]
    [PDF] The Evil Karmetasploit Upgrade - Exploit-DB
    This Work will improve security testing and development of a frame- work called Metasploit. This will be achieved by implementing the func-.
  7. [7]
    The Most Popular Penetration Testing Tools in 2025 - PlexTrac
    May 29, 2025 · Exploitation tools exploit flaws found by scanners, pentesting tools simulate attacks on computer systems and networks to identify ...
  8. [8]
    Show 99 - I Always use a VPN - Thomas d'Otreppe - Aircrack-NG
    Apr 25, 2012 · This week we are talking to Thomas d'Otreppe, author of Aircrack-NG and OpenWIPS-NG about his Open Source project and what they do ?Missing: fork motivations
  9. [9]
    Tools - Aircrack-ng
    Jan 16, 2023 · Aircrack-ng is a complete suite of tools to assess WiFi network security. All tools are command line which allows for heavy scripting.Aircrack-ng · Installing Aircrack-ng · Aircrack-ng is an 802.11 WEP... · Airmon-ng
  10. [10]
    Aircrack-ng Changelog
    May 11, 2022 · Airodump-ng: Increase console window size. Aircrack-ng: Added time remaining and percentage done when doing WPA cracking with a dictionary (file) ...
  11. [11]
    Aircrack-ng 1.0
    Sep 7, 2009 · There are not much changes compared to the 1.0rc4, just a few fixes. Here is the changelog: - airserv-ng: Now works fine between 32 and 64bit ...
  12. [12]
    Aircrack-ng 1.4
    Sep 29, 2018 · It focuses a lot on code quality and adds a few visible features: PMKID cracking; Crack 802.11w capture files; Speed and memory usage ...
  13. [13]
    aircrack-ng-1.7-9.fc42 - Fedora Packages
    Date, Author, Change. 2025-01-16, Fedora Release Engineering <releng at fedoraproject dot org> - 1.7-9, - Rebuilt for https://fedoraproject.org/wiki/ ...
  14. [14]
    What is WEP Security? - SecureW2
    Oct 27, 2024 · WEP (wired equivalent privacy) is an encryption method introduced by the Institute of Electrical and Electronics Engineers (IEEE) as part of the IEEE 802.11 ...
  15. [15]
    What is Wired Equivalent Privacy (WEP)? - TechTarget
    Aug 27, 2021 · Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b.
  16. [16]
    WEP Crack Explained: Threats to Legacy Wireless Networks
    CRC-32 is not cryptographically secure and is vulnerable to bit-flipping attacks. Attackers can manipulate encrypted packets and recompute the checksum without ...
  17. [17]
  18. [18]
    Weaknesses in the Key Scheduling Algorithm of RC4 - SpringerLink
    Dec 20, 2001 · In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance.
  19. [19]
    Gone in 120 seconds: cracking Wi-Fi security - The Register
    May 15, 2007 · When WEP was compromised in 2001, the attack needed more than five million packets to succeed. During the summer of 2004, a hacker named KoreK ...
  20. [20]
    [PDF] A Detailed Analysis of the KoreK Chopchop attack on WEP Networks
    The KoreK Chopchop attack is a method of decrypting packets on a WEP wireless network [5]. This attack exploits the RC4 stream cipher and the CRC-‐32 integrity ...
  21. [21]
    The Evolution of Wi-Fi Security: From WEP to WPA3 - TheXero
    Sep 1, 2024 · ... WEP was designed to provide a level of privacy comparable to wired networks. It used the RC4 stream cipher and a 40-bit or 104-bit key along ...Wep -- Wired Equivalent... · Wpa2 -- Robust Security... · Wpa3 -- The Future Of Wi-Fi...
  22. [22]
    Security Issues with Wi-Fi, Bluetooth, and ZigBee - DigiKey
    May 24, 2012 · In 2004, the Wi-Fi Alliance officially deprecated WEP, and since 2006, WPA2 has been mandatory in order to receive official certification.
  23. [23]
  24. [24]
    Practical attacks against WEP and WPA - Cryptology ePrint Archive
    Nov 18, 2008 · In this paper, we describe two attacks on IEEE 802.11 based wireless LANs. The first attack is an improved key recovery attack on WEP.
  25. [25]
    [PDF] Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
    Oct 30, 2017 · We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to reinstall an already ...
  26. [26]
    [PDF] Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks
    Wi-Fi. Protected Access II (WPA2) - Pre-shared key (PSK) is the current security standard used to protect small 802.11 wireless networks. Most of the available ...<|control11|><|separator|>
  27. [27]
    [PDF] Weaknesses in the Key Scheduling Algorithm of RC4 | Cornell
    RC4 has weak keys where a small part of the key determines many bits, and a related key vulnerability where part of the key is exposed. It is also insecure in  ...
  28. [28]
    [PDF] Attacks against the WiFi protocols WEP and WPA - matthieu.io
    Usually used in a terminal, it is able to perform the PTW attack, the FMS attack, and various replay attacks, including the Fragmentation attack. It is.
  29. [29]
    [PDF] Practical attacks against WEP and WPA - Aircrack-ng
    Nov 8, 2008 · They showed that an attacker can recover the secret key of the network with an average consumer laptop in 1-2 hours. More advanced attacks were ...Missing: 85000 IVs
  30. [30]
    Attacks on the WEP protocol - Cryptology ePrint Archive
    This thesis summarizes all major attacks on WEP. Additionally a new attack, the PTW attack, is introduced, which was partially developed by the author of this ...
  31. [31]
    KRACK Attacks: Breaking WPA2
    This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.Intro · Demo · Details · Paper
  32. [32]
    [PDF] GPU-based Password Cracking of Home Networks Using Modern ...
    Nov 10, 2023 · With the growing affordability of advanced hardware technology, such as modern gaming PCs equipped with powerful graphics processing units (GPUs) ...Missing: 2020s | Show results with:2020s
  33. [33]
    [PDF] Breaking 104 bit WEP in less than 60 seconds
    Abstract. We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a.
  34. [34]
    Aireplay-ng - Aircrack-ng
    Feb 9, 2022 · Aireplay-ng is used to inject frames. The primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys.Description · Usage · Fragmentation vs. Chopchop · Usage Troubleshooting
  35. [35]
    compatibility_drivers [Aircrack-ng]
    ### Compatible Chipsets and Examples for Packet Injection with aireplay-ng
  36. [36]
    Airodump-ng
    May 1, 2022 · Airodump-ng is used for packet capture, capturing raw 802.11 frames. It is particularly suitable for collecting WEP IVs (Initialization Vector) or WPA ...
  37. [37]
    Airbase-ng
    Mar 11, 2018 · Implements the Hirte WEP client attack. Ability to cause the WPA/WPA2 handshake to be captured. Ability to act as an ad-hoc Access Point.
  38. [38]
    Airmon-ng - Aircrack-ng
    Feb 9, 2022 · This script can be used to enable monitor mode on wireless interfaces. It may also be used to kill network managers, or go back from monitor mode to managed ...
  39. [39]
    besside-ng [Aircrack-ng]
    ### Besside-ng Summary
  40. [40]
    Airolib-ng
    Apr 15, 2019 · Airolib-ng is an aircrack-ng suite tool designed to store and manage essid and password lists, compute their Pairwise Master Keys (PMKs) and use them in WPA/ ...Missing: documentation | Show results with:documentation
  41. [41]
    airolib-ng(1) - Arch manual pages
    DESCRIPTION. airolib-ng is a tool for the aircrack-ng suite to store and manage essid and password lists, compute their Pairwise Master Keys (PMKs) ...
  42. [42]
    New tool: airolib-ng - Precompute and manage WPA/WPA2 tables
    Mar 10, 2018 · Reported by ebfe on 27 May 2007 11:27 UTC WPA/WPA2 cracking involves calculating the private master key, from which the private transient ...Missing: mkpassthrough | Show results with:mkpassthrough
  43. [43]
    Packetforge-ng - Aircrack-ng
    Aug 22, 2010 · The purpose of packetforge-ng is to create encrypted packets that can subsequently be used for injection.
  44. [44]
    wpaclean(1) — aircrack-ng — Debian unstable
    Sep 24, 2025 · wpaclean Cleans capture files to get only the 4-way handshake and a beacon. AUTHOR¶. This manual page was written by David Francos Cuartero < ...
  45. [45]
    aircrack-ng | Kali Linux Tools
    aircrack-ng Usage Examples WPA Wordlist Mode Specify the wordlist to use (-w password.lst) and the path to the capture file (wpa.cap) containing at least ...
  46. [46]
    [PDF] Attacking HDMI Distribution Networks via Consumer Electronic ...
    Oct 4, 2019 · cleans the capture .cap file using wpaclean. This greatly reduces the file size and the transfer begins. The attacker can finally receive the ...