Aircrack-ng is a complete suite of tools to assess WiFi network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
  • Testing: Checking WiFi cards and driver capabilities (capture and injection).
  • Cracking: WEP and WPA PSK (WPA 1 and 2).

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.

Fresh news

Wireless Pawn Edition (WPE) patches updated 30 Nov 16

If you want to attack WPA Enterprise, applying WPE patches to HostAPd or Freeradius would do the job. However, they haven't been updated in a long time and still used old software versions (HostAPd 2.2 and Freeradius 2.1 which is EOL).

It is no longer the case as they are now available for the latest and greatest version of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get released. The icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created.

All the details as well as a link to the patches can be found in this blog post.

Aircrack-ng compilation matrices 15 Feb 16

I tried to compile Aircrack-ng on a 'few' systems and different CPUs to see how it works and I was quite surprised by the amount of systems it can be compiled on (and most of the time, it can be compiled with both gcc and clang).

More details (matrices) in the blog.

Under the spotlights