LinuxCommandLibrary

airolib-ng

Pre-compute WPA/WPA2 PMK databases for faster cracking

TLDR

Create a new database

$ airolib-ng [database.db] --init
copy
Import a wordlist
$ airolib-ng [database.db] --import passwd [wordlist.txt]
copy
Import an ESSID
$ airolib-ng [database.db] --import essid [essid_file.txt]
copy
Batch process (pre-compute PMKs)
$ airolib-ng [database.db] --batch
copy
Verify database integrity
$ airolib-ng [database.db] --verify
copy
Show database statistics
$ airolib-ng [database.db] --stats
copy

SYNOPSIS

airolib-ng database operation [options]

DESCRIPTION

airolib-ng manages databases of pre-computed Pairwise Master Keys (PMKs) for WPA/WPA2 cracking. Computing PMKs is the slow part of WPA cracking; pre-computing them for common ESSIDs and passwords dramatically speeds up attacks.
The tool creates SQLite databases that aircrack-ng can use directly, trading storage space for cracking speed.

PARAMETERS

--init

Initialize a new database
--import passwd file
Import passwords from wordlist
--import essid file
Import ESSIDs from file
--import cowpatty file
Import cowpatty hash file
--batch
Compute all missing PMKs
--batch --essid name
Compute PMKs for specific ESSID
--verify [all]
Verify database integrity
--stats
Show database statistics
--clean [all]
Remove computed PMKs
--sql query
Execute SQL query

CAVEATS

Pre-computation only helps for known ESSIDs. Database files can become very large. PMKs are ESSID-specific; generic wordlist attacks don't benefit. Computing PMKs is CPU-intensive.

HISTORY

airolib-ng was added to the aircrack-ng suite to enable practical attacks against WPA/WPA2 networks by pre-computing the expensive PBKDF2 operations.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community