aircrack-ng
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
aircrack-ng [2018/07/11 20:59] – [Usage] Cosmetic improvements mister_x | aircrack-ng [2018/07/11 21:53] – Fixed displaying page mister_x | ||
---|---|---|---|
Line 123: | Line 123: | ||
|-1|// | |-1|// | ||
|-M|number|(WEP cracking) Specify the maximum number of IVs to use| | |-M|number|(WEP cracking) Specify the maximum number of IVs to use| | ||
- | |-V|// | + | |-V|// |
== WEP and WPA-PSK cracking options == | == WEP and WPA-PSK cracking options == | ||
Line 329: | Line 329: | ||
Now you have the passphrase and can connect to the network. | Now you have the passphrase and can connect to the network. | ||
+ | |||
+ | === SIMD === | ||
+ | |||
+ | Aircrack-ng is compiled with multiple optimizations based on CPU features we call crypto engines. CPU features are different based on the type of CPU. | ||
+ | |||
+ | On x86 (and 64 bit), typically SSE2, AVX and AVX2 are available (AVX512 can be compiled in but it should only be done if the current CPU supports it). On ARM, neon and ASIMD are usually available and on PowerPC, ASIMD and altivec. A generic optimization is always available no matter what architecture it is compiled on or for. A limited set of optimizations may be available depending on the OS/ | ||
+ | |||
+ | When running aircrack-ng, | ||
+ | |||
+ | In order to override, the option -'''' | ||
+ | |||
+ | aircrack-ng --simd=avx wpa.cap -w password.lst | ||
+ | |||
+ | In order to list all the available SIMD optimization, | ||
+ | |||
+ | aircrack-ng --simd-list | ||
+ | |||
+ | will display "avx2 avx sse2 generic" | ||
+ | |||
+ | ==== Cracking session ==== | ||
+ | |||
+ | Cracking can sometimes take a very long time and it is sometimes necessary to turn off the computer or put it to sleep for a while. In order to handle this kind of situation, a new set of option has been created. | ||
+ | |||
+ | It will create and/or update a session file saving the current status of the cracking (every 10 minutes) as well as all the options used, wordlists and capture files used. Multiple wordlists can be used and it works with WEP and WPA. | ||
+ | |||
+ | aircrack-ng --new-session current.session -w password.lst, | ||
+ | |||
+ | In order to restore the session, use -'''' | ||
+ | |||
+ | aircrack-ng --restore-session current.session | ||
+ | |||
+ | It will keep updating // | ||
+ | |||
+ | Limitations: | ||
+ | * The wordlist must be files. For now, they cannot be //stdin// or [[airolib-ng]] databases | ||
+ | * Session has to be restored from the same directory as when first using -'''' | ||
+ | * No new options can be added when restoring session | ||
===== Usage Tips ===== | ===== Usage Tips ===== | ||
==== General approach to cracking WEP keys ==== | ==== General approach to cracking WEP keys ==== |
aircrack-ng.txt · Last modified: 2019/09/18 22:39 by mister_x