aircrack-ng
TLDR
Crack WPA/WPA2 with wordlist
SYNOPSIS
aircrack-ng [-w wordlist] [-b bssid] [-e essid] [options] capture-file
DESCRIPTION
aircrack-ng is a WiFi security auditing tool that cracks WEP and WPA/WPA2-PSK encryption keys. For WPA/WPA2, it uses dictionary attacks against captured 4-way handshakes. For WEP, it exploits cryptographic weaknesses using statistical methods.
The tool reads packet capture files containing wireless traffic, identifies encryption types and captured handshakes, and attempts to recover the passphrase.
PARAMETERS
-w file
Wordlist for WPA/WPA2 cracking-b bssid
Target access point MAC address-e essid
Target network name-a mode
Attack mode (1: WEP, 2: WPA/WPA2)-l file
Write found key to file-q
Quiet mode (no status display)-S
Show real-time statistics-p threads
Number of CPU threads to use-K
Use Korek attack for WEP (faster)-x / -y
Disable brute-force for last bytes (WEP)
CAVEATS
For authorized security testing only. WPA/WPA2 cracking requires a captured 4-way handshake. Success depends on wordlist quality; complex passwords may be uncrackable. GPU-accelerated tools like hashcat are faster for WPA.
HISTORY
aircrack-ng evolved from the original aircrack tool, with the "-ng" (next generation) version first released in 2006. It became the standard open-source WiFi security assessment toolkit.
SEE ALSO
airodump-ng(1), aireplay-ng(1), hashcat(1)


