3. What is Aircrack ????
Aircrack-ng is a network software suite consisting
of a detector, packet sniffer, WEP and
WPA/WPA2-PSK cracker and analysis tool for
802.11 wireless LANs. It works with any wireless
network interface controller whose driver
supports raw monitoring mode and can sniff
802.11a, 802.11b and 802.11g traffic.
4. Aircrack-ng suite.
● airbase-ng -- Multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself.
● aircrack-ng -- 802.11 WEP and WPA/WPA2-PSK key cracking program.
● airdecap-ng -- Decrypt WEP/WPA/WPA2 capture files.
● airdecloak-ng -- Remove WEP Cloaking™ from a packet capture file.
● airdrop-ng -- A rule based wireless deauthintication tool.
● aireplay-ng -- Inject and replay wireless frames.
● airgraph-ng -- Graph wireless networks.
● airmon-ng -- Enable and disable monitor mode on wireless interfaces.
● airodump-ng -- Capture raw 802.11 frames.
● airolib-ng -- Precompute WPA/WPA2 passphrases in a database to use it later with aircrack-ng.
● airserv-ng -- Wireless card TCP/IP server which allows multiple application to use a wireless card.
● airtun-ng -- Virtual tunnel interface creator.
● packetforge-ng -- Create various type of encrypted packets that can be used for injection.
5. Commands we will use.
1. Airmon-ng(Start,select interface,Kill all process on interface).
1. Airodump-ng wlan0mon
(Wifi
Signals,Channel,Power,ESSID,BSSID,Ip,Cipher,Beacon,Encryption,Authentica
tion).
1. Airmon-ng -c (Channel of Selected Network) -w(Path to save related
information of network) BSSID of network to HANDSHAKE.
2. Aireplay-ng (DeAuthentication Packets).
3. Aircrack-ng -w (Wordlist Path) (Network info).
6. WORDLIST.
A wordlist is just a list of words that aircrack-ng is going to go
through, and trying each one against the handshake until it
successfully determines the WPA key. ... If the password is
not in our wordlist file, we will not be able to determine the
Password key. To create the wordlist, we're going to use a
tool called crunch.
7. HANDSHAKE.
As easier way to capture
handshakes for hacking
purposes involves the use of a
hacking tool called Aircrack-ng
and forced deauthentication of a
connected client PC in order to
make him reconnect back up to
the server exactly when you want
him to connect.
9. A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets
communication between a user and a Wi-Fi wireless access point.
Unlike most radio jammers, deauthentication acts in a unique way. The IEEE
802.11 (Wi-Fi) protocol contains the provision for a deauthentication frame.
Sending the frame from the access point to a station is called a "sanctioned
technique to inform a rogue station that they have been disconnected from the
network".[1]
An attacker can send a deauthentication frame at any time to a wireless access
point, with a spoofed address for the victim. The protocol does not require any
encryption for this frame, even when the session was established with Wired
Equivalent Privacy (WEP) for data privacy, and the attacker only needs to know
the victim's MAC address, which is available in the clear through wireless network
sniffing.