Aircrack-ng is a complete suite of tools to assess WiFi network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
  • Testing: Checking WiFi cards and driver capabilities (capture and injection)
  • Cracking: WEP and WPA PSK (WPA 1 and 2)

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.

Fresh news

Blog post: Using Qemu to run a Big Endian Debian system 15 Oct 18

PCAP, IVS and hashcat capture files contain headers that store timestamps and other fields as integer values. In most cases, we're dealing with the same endianness (little), so this isn't too big of a deal but when a program needs to run on both big and little endian, values needs to be swapped to read the values as they were stored.

We have quite a few buildbots to handle a lot of test cases and while we're taking care of swapping for endianness in most cases, one bug slipped through the net. This is a good opportunity to create a MIPS big endian system using QEMU and Debian as a guest so we can possibly use it later on as another buildbot.

Blog post: Aircrack-ng packages 08 Oct 18

As mentioned in our 1.4 release blog post, we are now providing package repositories for a number of Linux distributions: Debian, Ubuntu, OpenSuse, Fedora, RHEL, CentOS and a few others.

Getting this done for so many distributions (and multiple version of each) wasn't an easy feat but we're now automatically building packages for releases and, for the adventurous ones, each commit in our GitHub repository is packaged too, in a separate repository. Head to our blog post for more details and how to use it.

If you just want to install one of the repositories (git or release), head over to our repository.

Under the spotlights