Aircrack-ng is a complete suite of tools to assess WiFi network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
  • Testing: Checking WiFi cards and driver capabilities (capture and injection).
  • Cracking: WEP and WPA PSK (WPA 1 and 2).

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.

Fresh news

Blog post: lesser known features of Aircrack-ng 27 Mar 17

In this blog post, we'll discuss lesser known features of Aircrack-ng such as reading compressed wordlists, rainbow tables and distributed cracking.

Blog post: iw monitor flags 20 Feb 17

When setting an interface in monitor mode manually, iw has a few different flags: none, fcsfail, control, otherbss, cook, active.
The meaning of those different flags are explained in the blog post.

TL;DR: use 'none'.

BlackHat USA training 20 Jan 17

I'm really pleased to announce that Vivek Ramachandran and I will be teaching Advanced Wireless Exploitation at BlackHat USA this summer.

Under the spotlights