How to install the latest aircrack-ng release in Linux or Ubuntu Full (Guide)


What is Aircrack-ng ??

Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Command-line based and is available for Windows and Mac OS and other Unix based Operating systems.  The suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing.

Airmon-ng

Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode, and airmon-ng is used for that purpose.

Airodump-ng

Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes.

Aireplay-ng

Aireplay-ng is used for replay attacks and as a packet injector. It can be de-authenticate users from their APs to capture handshakes.


Airdecap-ng

Airdecap-ng is used to decrypt encrypted WEP, WPA/WPA2 wireless packets with a known key.

Aircrack-ng

Aircrack-ng is used to attack WPA/WEP wireless protocols to find the key.

Installation

Just type the following command and this will install all tools available in the Aircrack-ng suite.

sudo apt-get update
Sudo apt-get install -y aircrack-ng
install the latest aircrack-ng

Usage

In this article, we’ll take a quick look at how to use aircrack-ng to crack an encrypted wireless network (TR1CKST3R in this example) to find the password.

First of all, list out all available wireless cards connected to your PC using ‘iwconfig’ command.

install the latest aircrack-ng

We’ll use ‘wlxc83a35cb4546’ named wireless card for this tutorial (This might be different in your case). Now, kill all the processes running on the wireless card using airmon-ng.

ubuntu@ubuntu:~$ Sudo airmon-ng check kill
Start Monitor mode on ‘wlxc83a35cb4546’ by typing
ubuntu@ubuntu:~$ Sudo airmon-ng start wlxc83a35cb4546

install the latest aircrack-ng

Now, airmon-ng has started Monitor mode on the wireless card, it’ll appear as the different name ‘wlan0mon’. Run ‘iwconfig’ again to list wireless details.

install the latest aircrack-ng

ubuntu@ubuntu:~$ Sudo airodump-ng wlan0mon

install the latest aircrack-ng

You can narrow down the search using MAC (–bssid) and channel (-c) filters. To capture handshake (Handshake contains encrypted password), we need to save our packets somewhere using the “–write” option. Type,

ubuntu@ubuntu:~$ Sudo airodump-ng –bssid 6C:B7:49:FC:62:E4
-c 11 wlan0mon –write /tmp/handshake.cap–bssid : Access Point’s MAC Address-c : Access Point’s channel [113]–write : Stores captured packets at a defined location

Now, we need to de-authenticate every device from this Access Point using Aireplay-ng utility. Write

ubuntu@ubuntu:~$ Sudo aireplay-ng -0 100 -a [MAC_ADD] wlan0mon
install the latest aircrack-ng

a : Specify Access Points MAC for Aireplay-ng

-0 : Specify the number of death packets to send

After a while, all devices will be disconnected from that Access Point, when they’ll try to reconnect, running airodump-ng will capture the handshake. It’ll appear at the top of running airodump-ng.

install the latest aircrack-ng

Handshake is stored in the ‘/tmp/’ directory and contains an encrypted password that can be brute-forced offline using a dictionary. To crack the password, we’ll be using Aircrack-ng. Type

ubuntu@ubuntu:~$ Sudo aircrack-ng /tmp/handshake.cap-01.cap -w
/usr/share/wordlists/rockyou.txt
-w : Specify the dictionary location

Aircrack-ng will go through the list of passwords, and if found, it’ll display the password used as the key.

install the latest aircrack-ng

In this case, aircrack-ng found the password used ‘123456789’.

Now, stop Monitor mode on the wireless card and restart the network-manager.

ubuntu@ubuntu:~$ Sudo airmon-ng stop wlan0mon
ubuntu@ubuntu:~$ sudo service network-manager restart

Conclusion

Aircrack-ng can be used to audit Wireless Security or to crack forgotten passwords. There are some other similar tools available for this purpose like Kismet but aircrack-ng is better known for good support, versatility, and having a wide range of tools. It has easy to use Command-line interface which can easily be automated using any scripting language like Python.