LinuxCommandLibrary

aircrack-ng

TLDR

Crack WPA/WPA2 with wordlist

$ aircrack-ng -w [wordlist.txt] [capture.cap]
copy
Crack WEP with captured IVs
$ aircrack-ng [capture.cap]
copy
Specify target BSSID
$ aircrack-ng -b [00:11:22:33:44:55] [capture.cap]
copy
Use multiple wordlists
$ aircrack-ng -w [list1.txt],[list2.txt] [capture.cap]
copy
Show cracking statistics
$ aircrack-ng -S [capture.cap]
copy

SYNOPSIS

aircrack-ng [-w wordlist] [-b bssid] [-e essid] [options] capture-file

DESCRIPTION

aircrack-ng is a WiFi security auditing tool that cracks WEP and WPA/WPA2-PSK encryption keys. For WPA/WPA2, it uses dictionary attacks against captured 4-way handshakes. For WEP, it exploits cryptographic weaknesses using statistical methods.
The tool reads packet capture files containing wireless traffic, identifies encryption types and captured handshakes, and attempts to recover the passphrase.

PARAMETERS

-w file

Wordlist for WPA/WPA2 cracking
-b bssid
Target access point MAC address
-e essid
Target network name
-a mode
Attack mode (1: WEP, 2: WPA/WPA2)
-l file
Write found key to file
-q
Quiet mode (no status display)
-S
Show real-time statistics
-p threads
Number of CPU threads to use
-K
Use Korek attack for WEP (faster)
-x / -y
Disable brute-force for last bytes (WEP)

CAVEATS

For authorized security testing only. WPA/WPA2 cracking requires a captured 4-way handshake. Success depends on wordlist quality; complex passwords may be uncrackable. GPU-accelerated tools like hashcat are faster for WPA.

HISTORY

aircrack-ng evolved from the original aircrack tool, with the "-ng" (next generation) version first released in 2006. It became the standard open-source WiFi security assessment toolkit.

SEE ALSO

Copied to clipboard