A complete suite of tools to assess WiFi network security, handling monitoring, packet capture, deauthentication attacks, and cracking WPA/WPA2 keys.
At its core, Aircrack-ng is two things: it is the name of a complete, multi-purpose suite of wireless security tools, and it is the name of the specific password-cracking program within that suite.
Here is the detailed, technical definition of both.
1. Aircrack-ng (The Tool)
Specifically, aircrack-ng is an offline 802.11 WEP and WPA/WPA2-PSK key cracking program.
-
How it cracks WEP: It uses statistical cryptanalysis. Because the older WEP encryption standard is fundamentally broken,
aircrack-ngcan analyze a large enough volume of captured network packets to mathematically reverse-engineer the network key without needing a dictionary. -
How it cracks WPA/WPA2: It relies entirely on a dictionary attack (or brute-force attack) against a captured 4-way handshake. It takes a plaintext password from a text file (your wordlist), combines it with the network’s name (SSID), and hashes it using the PBKDF2 algorithm to create a Pairwise Master Key (PMK). It then uses this PMK to simulate the cryptographic handshake. If its simulated handshake matches the raw handshake you captured from the air, the tool knows it has found the correct password.
Because this WPA hashing process is mathematically intense, the aircrack-ng tool is heavily optimized. It can run across multiple CPU cores to test tens of thousands of keys per second.
2. Aircrack-ng (The Suite)
The password cracker is useless without the raw network data to crack. Therefore, the broader “Aircrack-ng Project” encompasses a full suite of specialized command-line tools designed to handle every phase of a Wi-Fi audit. The “ng” simply stands for “New Generation,” as it is an updated fork of the original Aircrack project from the early 2000s.
+1
The core toolkit ecosystem includes:
-
airmon-ng(Preparation): A script used to enable monitor mode on wireless interfaces. It allows the Wi-Fi card to bypass standard networking protocols and blindly capture all raw 802.11 radio frames in the air. -
airodump-ng(Collection): A packet capture tool specifically built for 802.11 frames. It scans the airwaves, displays nearby networks and connected clients, and logs the raw data (including those vital WPA handshakes) into.capfiles foraircrack-ngto analyze offline. -
aireplay-ng(Injection): A tool used to inject custom-crafted frames into a network. Its primary use in modern testing is sending deauthentication frames to force clients offline, generating the handshake needed byairodump-ng. -
airbase-ng(Impersonation): A tool used to configure the attacker’s Wi-Fi card to act as a Rogue Access Point, forming the foundation of the Evil Twin attacks we discussed earlier.
In summary, Aircrack-ng is the foundational, industry-standard framework for assessing the cryptographic strength, visibility, and configuration of 802.11 wireless networks.
tools packetcapture packetsniffing wifihacking #techniques