snippetbashTip
aircrack-ng — Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software
Viewed 0 times
commandaircrack-ngwepandwpawpa2clicrack
Problem
How to use the
aircrack-ng command: Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=aircrack-ng>.Solution
aircrack-ng — Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=aircrack-ng>.Crack key from capture file using [w]ordlist:
aircrack-ng -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}Crack key using multiple CPU threads from capture file using [w]ordlist:
aircrack-ng -p {{number}} -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}Crack key from capture file using [w]ordlist and the access point's [e]ssid:
aircrack-ng -w {{path/to/wordlist.txt}} -e {{essid}} {{path/to/capture.cap}}Crack key from capture file using [w]ordlist and the access point's MAC address:
aircrack-ng -w {{path/to/wordlist.txt}} --bssid {{mac}} {{path/to/capture.cap}}Code Snippets
Crack key from capture file using [w]ordlist
aircrack-ng -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}Crack key using multiple CPU threads from capture file using [w]ordlist
aircrack-ng -p {{number}} -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}Crack key from capture file using [w]ordlist and the access point's [e]ssid
aircrack-ng -w {{path/to/wordlist.txt}} -e {{essid}} {{path/to/capture.cap}}Crack key from capture file using [w]ordlist and the access point's MAC address
aircrack-ng -w {{path/to/wordlist.txt}} --bssid {{mac}} {{path/to/capture.cap}}Context
tldr-pages: common/aircrack-ng
Revisions (0)
No revisions yet.