LinuxCommandLibrary

airtun-ng

Create virtual tunnel interfaces for encrypted WiFi traffic

TLDR

Create a virtual tunnel interface

$ sudo airtun-ng -a [AP_BSSID] [wlan0mon]
copy
Create tunnel with WEP key
$ sudo airtun-ng -a [AP_BSSID] -w [hex_key] [wlan0mon]
copy
Create tunnel with WPA passphrase
$ sudo airtun-ng -a [AP_BSSID] -p [passphrase] -e [SSID] [wlan0mon]
copy
Create repeater mode tunnel
$ sudo airtun-ng -a [AP_BSSID] -r [capture.cap] [wlan0mon]
copy

SYNOPSIS

airtun-ng [-a bssid] [-w wepkey] [-p wpapass -e essid] [options] interface

DESCRIPTION

airtun-ng creates virtual tunnel interfaces (at0, at1, etc.) that allow sending and receiving decrypted traffic to/from a wireless network. This enables using standard network tools with encrypted WiFi networks when you know the key.
The tool can operate in WEP or WPA mode, creating a virtual ethernet interface that handles encryption/decryption transparently.

PARAMETERS

-a bssid

Access point MAC address
-w key
WEP key in hexadecimal
-p passphrase
WPA passphrase
-e essid
Network name (required for WPA)
-t flag
Tunnel type: 0=auto, 1=WDS, 2=normal
-r file
Replay packets from capture file
-h mac
Source MAC address

CAVEATS

For authorized testing only. Interface must be in monitor mode. WPA mode requires the 4-way handshake to be completed. Virtual interface must be configured (IP, etc.) after creation.

HISTORY

airtun-ng was added to the aircrack-ng suite to enable post-exploitation scenarios where captured keys could be used to interact with the network using standard tools.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community