We’ll now start catching network packets by running the airodump-ng on mon0. Look for the line at the end to find the monitor mode interface. We’ll use the airmon-ng command to start a network monitor interface on wlp2s0. ESSID, i.e., the network name is “tmp”, which is the name of Wifi network I am connected to. Here, wlp2s0 is the name of my wireless interface. Now let’s try to crack password of a local Wi-Fi network using Aircrack-ng.įirs of all, run command iwconfig to find the name of your wireless network interface. On Debian based distributions, run the following command: curl -s | sudo bashįor Red-hat Package Manager (RPM), run the following command: curl -s | sudo bash Open the terminal, and run the following commands based on your Linux OS type. You can easily Install Aircrack-ng on your system using the installer script provided by packagecloud.io. That means it can only crack the password if the password is a dictionary word. Hence, the way to crack WPA/WPA2 by programs like aircrack-ng, is Brute Force and requires a dictionary of passwords to crack it. Note that cracking WPA/WPA2 using crypto-algorithms has been found by researchers to be nearly impossible. It offers seperate programs for monitoring status of network devices, capturing packets and dumping in files, cracking passwords, etc. It is meant to crack IEEE 802.11 protocol wireless network passwords, which are mostly protected by Wifi Protected Access (WPA) or Wifi Protected Access 2 (WPA2) standards and authenticated by Pre-Shared Key (PSK) authentication method. ![]() The Aircrack-ng suite is perhaps the most widely used set of WiFi network sniffing and password capturing tools. Let us take a look at three such tools: Aircrack-ng, Jack The Ripper, and Radare2. They come with a wide variety of tools meant of cyber security purposes. Linux and Unix based operating systems have been at the core of the fields of Information Security, Network Security, Cryptography, etc.
0 Comments
Leave a Reply. |