User Tools

Site Tools


airolib-ng

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
airolib-ng [2008/07/31 21:10] – Added sample database darkaudaxairolib-ng [2009/09/08 01:22] – Fixed performance value and removed comma mister_x
Line 1: Line 1:
 ====== Airolib-ng ====== ====== Airolib-ng ======
- 
-++++++ IMPORTANT ++++++\\ 
-++++++ IMPORTANT ++++++\\ 
-++++++ IMPORTANT ++++++\\ 
- 
-This functionality will be available in a future release. It is NOT available currently. 
- 
-++++++ IMPORTANT ++++++\\ 
-++++++ IMPORTANT ++++++\\ 
-++++++ IMPORTANT ++++++\\ 
  
 ===== Description ===== ===== Description =====
Line 17: Line 7:
 WPA/WPA2 cracking involves calculating the pairwise master key, from which the private transient key (PTK) is derived.   Using the PTK, we can compute the frame message identity code (MIC) for a given packet and will potentially find the MIC to be identical to the packet's thus the PTK was correct therefore the PMK was correct as well. WPA/WPA2 cracking involves calculating the pairwise master key, from which the private transient key (PTK) is derived.   Using the PTK, we can compute the frame message identity code (MIC) for a given packet and will potentially find the MIC to be identical to the packet's thus the PTK was correct therefore the PMK was correct as well.
  
-Calculating the PMK is very slow since it uses the pbkdf2 algorithm.  Yet the PMK is always the same for a given ESSID and password combination. This allows us to pre-compute the PMK for given combinations and speed up cracking the wpa/wpa2 handshake.  Tests on have shown that using this technique in [[aircrack-ng]] can check more than 30,000 passwords per second using pre-computed PMK tables.+Calculating the PMK is very slow since it uses the pbkdf2 algorithm.  Yet the PMK is always the same for a given ESSID and password combination. This allows us to pre-compute the PMK for given combinations and speed up cracking the wpa/wpa2 handshake.  Tests on have shown that using this technique in [[aircrack-ng]] can check more than 50 000 passwords per second using pre-computed PMK tables.
  
 Computing the PMK is still required, yet we can: Computing the PMK is still required, yet we can:
Line 291: Line 281:
  
    KEY FOUND! [ 12345678 ]    KEY FOUND! [ 12345678 ]
 +
  
  
Line 299: Line 290:
 The commands are either of: The commands are either of:
  
-   aircrack-ng -r passphrase.db wpa.cap +   aircrack-ng -r passphrases.db wpa.cap 
-   aircrack-ng -r passphrase.db wpa2.eapol.cap+   aircrack-ng -r passphrases.db wpa2.eapol.cap
  
 This should give you the passphase.  Success indicates that your setup is working correctly. This should give you the passphase.  Success indicates that your setup is working correctly.
Line 306: Line 297:
  
 ===== Usage Troubleshooting ===== ===== Usage Troubleshooting =====
 +
  
 ==== Enabling Airolib-ng ==== ==== Enabling Airolib-ng ====
-Airolib-ng is not compiled by default.  To enable compiling, do "make SQLITE=true" and "make sqlite=true install".+Airolib-ng is not compiled by default.  To enable compiling, do "make sqlite=true" and "make sqlite=true install".
  
 ==== Compile Error ==== ==== Compile Error ====
airolib-ng.txt · Last modified: 2019/04/15 19:07 by mister_x