Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Aircrack-Ng for Windows

Aircrack-Ng for Windows



|Views: 48,098 |Likes:
Published by api-3861287

More info:

Published by: api-3861287 on Oct 19, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Aircrack-ng for Windows - Aircrack:
 Project Homepage:http://www.aircrack-ng.org/index.php?title=Main_Page Aircrack-ng is the next generation of Christophe Devine's excellent aircrack suite of tools.INSTALLING AIRCRACK-NG FOR WINDOWS RUNNING AIRCRACK-NG FOR WINDOWS BREAKING WEP BREAKING WPA 
Running Aircrack-ng for Windows:
 Once as many IVs as required have been captured using theairodumppacket capture utilitythe resultant
file can be imported into aircrack to break the static WEP orWPA-PSK keys. To view all available switches:
cd c:\aircrack-ng-[version]
 Basic usage:
aircrack -q -n [WEP key length] -b [BSSID] [filename].cap
aircrack -q -n -b capture2.cap
Breaking WEP:
 As you can see the capture file in use below (
) was created with airodumpcapture option "
Only capture WEP IVs (y/n)
" set to
as the resultant file is in the
format. If 
had been selected the resultant file would be in the
 Whilst this will work, we can could have cut down the cracking options for Aircrack-ng byspecifying the WEP key length (
) or by specifying the target AP MAC address (
) on thecommand line: 
aircrack -a 1 -q -n 128 -b 11:11:11:11:11:11 capture1.ivs
(Where11:11:11:11:11:11 = Target AP's MAC address) As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in
only 4 seconds
. The capture file itself (
) is includedhereto test your own aircrack installs (note:the file is a 5.77mb download). 
Breaking WPA:
 In order to be carry out the WPA dictionary attack using aircrack-ng we either have to: 1.Wait for a WPA client to associate to the network (This could take a while)2.Force a WPA client off the network, forcing it to reassociate. Either of these two method allows us to capture the WPA handshake, which is what we requireto perform a dictionary attack. The downside to using this Windows version of aircrack-ng is that there are not any freelyavailable tools to perform this attack. So we have to either use a Linux tools (e.g.aireplayorvoid11) or wait for an association to occur.Which ever way we gather the WPA handshake we still use the same tool;airodump.

Activity (172)

You've already reviewed this. Edit your review.
1 hundred thousand reads
1 thousand reads
1 hundred reads
tataraseanu liked this
andysaon23 liked this
Azothmagnum liked this
dudd123 liked this
vitelioat liked this
Ebby Sigasare liked this
Samad Khan liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->