aircrack-ng
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
aircrack-ng [2010/10/05 02:53] – Add note regarding default attack modes in various versions. netrolller3d | aircrack-ng [2018/03/11 18:58] – Updated link to ticket mister_x | ||
---|---|---|---|
Line 91: | Line 91: | ||
^Option^Param.^Description^ | ^Option^Param.^Description^ | ||
|-a|amode|Force attack mode (1 = static WEP, 2 = WPA/ | |-a|amode|Force attack mode (1 = static WEP, 2 = WPA/ | ||
- | |-b|bssid|Long version --bssid. Select the target network based on the access point' | + | |-b|bssid|Long version - -bssid. Select the target network based on the access point' |
|-e|essid|If set, all IVs from networks with the same ESSID will be used. This option is also required for WPA/ | |-e|essid|If set, all IVs from networks with the same ESSID will be used. This option is also required for WPA/ | ||
|-p|nbcpu|On SMP systems: # of CPU to use. This option is invalid on non-SMP systems.| | |-p|nbcpu|On SMP systems: # of CPU to use. This option is invalid on non-SMP systems.| | ||
Line 104: | Line 104: | ||
|-i|index|(WEP cracking) Only keep the IVs that have this key index (1 to 4). The default behaviour is to ignore the key index.| | |-i|index|(WEP cracking) Only keep the IVs that have this key index (1 to 4). The default behaviour is to ignore the key index.| | ||
|-f|fudge|(WEP cracking) By default, this parameter is set to 2 for 104-bit WEP and to 5 for 40-bit WEP. Specify a higher value to increase the bruteforce level: cracking will take more time, but with a higher likelyhood of success.| | |-f|fudge|(WEP cracking) By default, this parameter is set to 2 for 104-bit WEP and to 5 for 40-bit WEP. Specify a higher value to increase the bruteforce level: cracking will take more time, but with a higher likelyhood of success.| | ||
- | |-H|// | + | |-H|// |
- | |-l|file name|(Lowercase L, ell) logs the key to the file specified.| | + | |-l|file name|(Lowercase L, ell) logs the key to the file specified. Overwrites the file if it already exists.| |
|-K|// | |-K|// | ||
|-k|korek|(WEP cracking) There are 17 korek statistical attacks. Sometimes one attack creates a huge false positive that prevents the key from being found, even with lots of IVs. Try -k 1, -k 2, ... -k 17 to disable each attack selectively.| | |-k|korek|(WEP cracking) There are 17 korek statistical attacks. Sometimes one attack creates a huge false positive that prevents the key from being found, even with lots of IVs. Try -k 1, -k 2, ... -k 17 to disable each attack selectively.| | ||
Line 115: | Line 115: | ||
|-X|// | |-X|// | ||
|-y|// | |-y|// | ||
- | |-u|// | + | |-u|// |
|-w|words|(WPA cracking) Path to a wordlist or " | |-w|words|(WPA cracking) Path to a wordlist or " | ||
|-z|// | |-z|// | ||
- | |-P|// | + | |-P|// |
- | |-C|MACs|Long version --combine. | + | |-C|MACs|Long version - -combine. |
- | |-D|// | + | |-D|// |
- | |-V|// | + | |-V|// |
- | |-1|// | + | |-1|// |
+ | |-S|// | ||
+ | |-s|// | ||
+ | |-E|file> | ||
+ | |-J|file|(WPA cracking) Create Hashcat Capture file| | ||
===== Usage Examples ===== | ===== Usage Examples ===== | ||
==== WEP ==== | ==== WEP ==== | ||
Line 396: | Line 399: | ||
Although it is not part of aircrack-ng, | Although it is not part of aircrack-ng, | ||
- | | + | |
Line 505: | Line 508: | ||
If you are sure your capture file contains a valid handshake then use Wireshark or an equivalent piece of software and manually pull out the beacon packet plus a set of handshake packets. | If you are sure your capture file contains a valid handshake then use Wireshark or an equivalent piece of software and manually pull out the beacon packet plus a set of handshake packets. | ||
- | There is an open [[http://trac.aircrack-ng.org/ticket/651|trac ticket]] to correct this incorrect behavior. | + | There is an open [[https://github.com/ |
aircrack-ng.txt · Last modified: 2019/09/18 22:39 by mister_x