User Tools

Site Tools


aircrack-ng

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
aircrack-ng [2018/07/11 21:51]
mister_x [WPA] Added SIMD section
aircrack-ng [2018/08/31 20:33] (current)
mister_x [Sample files to try] Updated sample files
Line 105: Line 105:
 |-t|//​none//​|Restrict the search space to binary coded decimal hex characters| |-t|//​none//​|Restrict the search space to binary coded decimal hex characters|
 |-h|//​none//​|Restrict the search space to numeric characters (0x30-0x39) These keys are used by default in most Fritz!BOXes| |-h|//​none//​|Restrict the search space to numeric characters (0x30-0x39) These keys are used by default in most Fritz!BOXes|
-|-d|start|Long version --debug. ​ Set the beginning of the WEP key (in hex), for debugging purposes|+|-d|start|Long version -''''​-debug. ​ Set the beginning of the WEP key (in hex), for debugging purposes|
 |-m|maddr|MAC address to filter WEP data packets. Alternatively,​ specify -m ff:​ff:​ff:​ff:​ff:​ff to use all and every IVs, regardless of the network| |-m|maddr|MAC address to filter WEP data packets. Alternatively,​ specify -m ff:​ff:​ff:​ff:​ff:​ff to use all and every IVs, regardless of the network|
 |-n|nbits|Specify the length of the key: 64 for 40-bit WEP, 128 for 104-bit WEP, etc. The default value is 128| |-n|nbits|Specify the length of the key: 64 for 40-bit WEP, 128 for 104-bit WEP, etc. The default value is 128|
Line 145: Line 145:
  
 ^Option^Param.^Description^ ^Option^Param.^Description^
-|--simd|optimization|Use user-specified SIMD optimization instead of the fastest one| +|-''''​-simd|optimization|Use user-specified SIMD optimization instead of the fastest one| 
-|--simd-list|//​none//​|Shows a list of the SIMD optimizations available|+|-''''​-simd-list|//​none//​|Shows a list of the SIMD optimizations available|
  
 == Other options == == Other options ==
Line 342: Line 342:
   aircrack-ng --simd=avx wpa.cap -w password.lst   aircrack-ng --simd=avx wpa.cap -w password.lst
  
-In order to list all the available SIMD optimization,​ use -'''​-simd-list. Such as+In order to list all the available SIMD optimization,​ use -''''​-simd-list. Such as
  
   aircrack-ng --simd-list   aircrack-ng --simd-list
  
 will display "avx2 avx sse2 generic"​ on x86. will display "avx2 avx sse2 generic"​ on x86.
 +
 ==== Cracking session ==== ==== Cracking session ====
  
Line 445: Line 446:
 There are a number of sample files that you can try with aircrack-ng to gain experience: There are a number of sample files that you can try with aircrack-ng to gain experience:
  
-  * wpa.cap: ​ This is a sample file with a wpa handshake. ​ It is located in the "​test"​ directory of the install files. ​ The passphrase is "​biscotte"​. ​ Use the password file (password.lst) which is in the same directory. +  * [[https://​github.com/​aircrack-ng/​aircrack-ng/​raw/​master/​test/​wpa.cap|wpa.cap]]:  This is a sample file with a wpa handshake. ​ It is located in the "​test"​ directory of the install files. ​ The passphrase is "​biscotte"​. ​ Use the password file (password.lst) which is in the same directory. 
-  * wpa2.eapol.cap:​ This is a sample file with a wpa2 handshake. ​ It is located in the "​test"​ directory of the install files. ​ The passphrase is "​12345678"​. ​ Use the password file (password.lst) which is in the same directory.+  * [[https://​github.com/​aircrack-ng/​aircrack-ng/​raw/​master/​test/​wpa2.eapol.cap|wpa2.eapol.cap]]: This is a sample file with a wpa2 handshake. ​ It is located in the "​test"​ directory of the install files. ​ The passphrase is "​12345678"​. ​ Use the password file (password.lst) which is in the same directory.
   * [[http://​download.aircrack-ng.org/​wiki-files/​other/​test.ivs|test.ivs]]:​ This is a 128 bit WEP key file.  The key is "​AE:​5B:​7F:​3A:​03:​D0:​AF:​9B:​F6:​8D:​A5:​E2:​C7"​.   * [[http://​download.aircrack-ng.org/​wiki-files/​other/​test.ivs|test.ivs]]:​ This is a 128 bit WEP key file.  The key is "​AE:​5B:​7F:​3A:​03:​D0:​AF:​9B:​F6:​8D:​A5:​E2:​C7"​.
-  * [[http://dl.aircrack-ng.org/ptw.cap|ptw.cap]]:​ This is a 64 bit WEP key file suitable for the PTW method. ​ The key is "​1F:​1F:​1F:​1F:​1F"​.+  * [[https://github.com/aircrack-ng/​aircrack-ng/​raw/​master/​test/​wep_64_ptw.cap|ptw.cap]]:​ This is a 64 bit WEP key file suitable for the PTW method. ​ The key is "​1F:​1F:​1F:​1F:​1F". 
 +  * [[https://​github.com/​aircrack-ng/​aircrack-ng/​raw/​master/​test/​wpa-psk-linksys.cap|wpa-psk-linksys.cap]]:​ This is a sample file with a WPA1 handshake along with some encrypted packets. Useful for testing with airdecap-ng. The password is "​dictionary"​. 
 +  * [[https://​github.com/​aircrack-ng/​aircrack-ng/​raw/​master/​test/​wpa2-psk-linksys.cap|wpa2-psk-linksys.cap]]:​ This is a sample file with a WPA2 handshake along with some encrypted packets. Useful for testing with airdecap-ng. The password is "​dictionary".
  
 ==== Dictionary Format ==== ==== Dictionary Format ====
aircrack-ng.1531338677.txt.gz · Last modified: 2018/07/11 21:51 by mister_x