29-03-2021

Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Aircrack-ng is command line based and is available for Windows and Mac OS and other Unix based Operating systems. Aircrack-ng suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing.

Install the aircrack package first, then you will be able to use the airmon-ng command. Open a terminal and type: sudo apt-get install aircrack-ng You may now use the command. Sudo airmong-ng. The script will then set a random mac address using macchanger, after the script has set a random mac address it will put the wireless interface into monitor mode using iwconfig (not airmon-ng) after the script has successfully set the interface into monitor mode it will then put the wireless interface back up and start airodump-ng. Year after year, air pollution, contamination, and measures of pollen increase. Use Airmon to assess the air around where you live! Addressing this issue of PM2.5, you can easily measure PM 10 and PM 2.5 anywhere at any time when you use the palm size Airmon and the phone app. Easily examine the pollution situation and the air quality of a familiar place, such as a home or neighborhood park. How to hack WiFi – the action plan: Download and install the latest aircrack-ng; Start the wireless interface in monitor mode using the airmon-ng; Start the airodump-ng on AP channel with filter for BSSID to collect authentication handshake Optional Use the aireplay-ng to deauthenticate the wireless client; Run the aircrack-ng to hack the WiFi password by cracking the authentication handshake. The DVD or CD install that came with your Mac; A Copy of Aircrack-ng 1.1 (just download, Do NOT unzip); A Copy of Macports, (OPTIONAL for Install #2) you can download either directly from the website or choose between the following two: MacPorts for OS X 10.6 (Snow Leopard); MacPorts for OS X 10.5 (Leopard); The Admin rights on your Mac, or at least the Admin Password.

Airmon-ng

Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode and airmon-ng is used for that purpose.

Airodump-ng

Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes.

Aireplay-ng

Aireplay-ng is used for replay attacks and as packet injector. It can be de-authenticate users from their APs to capture handshakes.

Airdecap-ng

Airdecap-ng is used to decrypt encrypted WEP, WPA/WPA2 wireless packets with known key.

Aircrack-ng

Aircrack-ng is used to attack WPA/WEP wireless protocols in order to find the key.

Aircrack-ng is easy to install in Ubuntu using APT. Just type the following command and this will install all tools available in Aircrack-ng suite.

sudoapt-get update
sudoapt-get install-y aircrack-ng
Macbook

Usage

In this article, we’ll take a quick look at how to use aircrack-ng to crack an encrypted wireless network (TR1CKST3R in this example) to find the password.

First of all, list out all available wireless cards connected to your PC using ‘iwconfig’ command.

We’ll use ‘wlxc83a35cb4546’ named wireless card for this tutorial (This might be different in your case). Now, kill all the processes running on wireless card using airmon-ng.

ubuntu@ubuntu:~$ sudo airmon-ng check kill
Start Monitor mode on ‘wlxc83a35cb4546’ by typing
ubuntu@ubuntu:~$ sudo airmon-ng start wlxc83a35cb4546

Now, airmon-ng has started Monitor mode on wireless card, it’ll appear as different name ‘wlan0mon’. Run ‘iwconfig’ again to list wireless details.

Then, use airodump-ng to see nearby Wireless Access Points and their properties.

You can narrow down search using MAC (–bssid) and channel (-c) filters. To capture handshake (Handshake contains encrypted password), we need to save our packets somewhere using “–write” option. Type,

ubuntu@ubuntu:~$ sudo airodump-ng --bssid 6C:B7:49:FC:62:E4
-c11 wlan0mon --write/tmp/handshake.cap
--bssid : Access Point’s MAC Address
-c : Access Point’s channel [1-13]
--write : Stores captured packets at a defined location

Now, we need to de-authenticate every device from this Access Point using Aireplay-ng utility. Write

Airmon mac os
ubuntu@ubuntu:~$ sudo aireplay-ng -0100-a[MAC_ADD] wlan0mon

-a : Specify Access Points MAC for Aireplay-ng

-0 : Specify number of deauth packets to send

After a while, all devices will be disconnected from that Access Point, when they’ll try to reconnect, running airodump-ng will capture the handshake. It’ll appear at the top of running airodump-ng.

Airmon For Macbook Pro

Handshake is stored in ‘/tmp/’ directory, and contains encrypted password that can be brute forced offline using a dictionary. To crack the password, we’ll be using Aircrack-ng. Type

ubuntu@ubuntu:~$ sudo aircrack-ng /tmp/handshake.cap-01.cap -w
/usr/share/wordlists/rockyou.txt
-w : Specify the dictionary location

Aircrack-ng will go through the list of passwords, and if found, it’ll display the password used as key.

Airmon Mac Os

In this case, aircrack-ng found the password used ‘123456789’.

Now, stop Monitor mode on wireless card and restart the network-manager.

Airmon

Airmon-ng For Macos

ubuntu@ubuntu:~$ sudo airmon-ng stop wlan0mon
ubuntu@ubuntu:~$ sudo service network-manager restart
Airmon-ng for macos

Conclusion

Airmon For Macbook Air

Aircrack-ng can be used to audit Wireless Security or to crack forgotten passwords. There are some other similar tools available for this purpose like Kismet but aircrack-ng is better known for good support, versatility and having wide range of tools. It has easy to use Command line interface which can easily be automated using any scripting language like Python.