HiveBrain v1.2.0
Get Started
← Back to all entries
snippetbashTip

aircrack-ng — Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software

Submitted by: @import:tldr-pages··
0
Viewed 0 times
commandaircrack-ngwepandwpawpa2clicrack

Problem

How to use the aircrack-ng command: Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=aircrack-ng>.

Solution

aircrack-ng — Crack WEP and WPA/WPA2 keys from handshake in captured packets. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=aircrack-ng>.

Crack key from capture file using [w]ordlist:
aircrack-ng -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}


Crack key using multiple CPU threads from capture file using [w]ordlist:
aircrack-ng -p {{number}} -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}


Crack key from capture file using [w]ordlist and the access point's [e]ssid:
aircrack-ng -w {{path/to/wordlist.txt}} -e {{essid}} {{path/to/capture.cap}}


Crack key from capture file using [w]ordlist and the access point's MAC address:
aircrack-ng -w {{path/to/wordlist.txt}} --bssid {{mac}} {{path/to/capture.cap}}

Code Snippets

Crack key from capture file using [w]ordlist

aircrack-ng -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}

Crack key using multiple CPU threads from capture file using [w]ordlist

aircrack-ng -p {{number}} -w {{path/to/wordlist.txt}} {{path/to/capture.cap}}

Crack key from capture file using [w]ordlist and the access point's [e]ssid

aircrack-ng -w {{path/to/wordlist.txt}} -e {{essid}} {{path/to/capture.cap}}

Crack key from capture file using [w]ordlist and the access point's MAC address

aircrack-ng -w {{path/to/wordlist.txt}} --bssid {{mac}} {{path/to/capture.cap}}

Context

tldr-pages: common/aircrack-ng

Revisions (0)

No revisions yet.