Esta página se muestra en inglés. Una traducción al español está en curso.
ConfigsMay 15, 2026·3 min de lectura

Aircrack-ng — WiFi Network Security Auditing Suite

A complete suite of WiFi security tools for monitoring, attacking, testing, and cracking wireless networks, used by security professionals for authorized WiFi assessments.

Listo para agents

Este activo puede ser leído e instalado directamente por agents

TokRepo expone un comando CLI universal, contrato de instalación, metadata JSON, plan según adaptador y contenido raw para que los agents evalúen compatibilidad, riesgo y próximos pasos.

Needs Confirmation · 64/100Política: confirmar
Superficie agent
Cualquier agent MCP/CLI
Tipo
Skill
Instalación
Single
Confianza
Confianza: Established
Entrada
Aircrack-ng Overview
Comando CLI universal
npx tokrepo install 0f49b63d-509c-11f1-9bc6-00163e2b0d79

Introduction

Aircrack-ng is a network security toolkit focused on WiFi security assessment. It provides tools for packet capture, deauthentication testing, WEP/WPA cracking, and wireless network analysis. It is a standard tool in penetration testing distributions and is used by security professionals to audit the strength of wireless network configurations.

What Aircrack-ng Does

  • Captures raw 802.11 frames in monitor mode for offline analysis
  • Cracks WEP keys using statistical attacks on captured initialization vectors
  • Recovers WPA/WPA2 pre-shared keys by testing captured handshakes against wordlists
  • Tests network resilience with deauthentication and fake access point injection
  • Analyzes packet captures for reconnaissance and traffic pattern identification

Architecture Overview

Aircrack-ng is written in C with a modular design where each tool handles a specific function. Airmon-ng manages monitor mode interfaces, airodump-ng captures packets, aireplay-ng injects frames, and aircrack-ng performs key recovery. The cracking engine uses optimized PBKDF2-SHA1 implementations with SIMD acceleration (SSE2, AVX2) for WPA key derivation. Tools communicate via standard pcap capture files.

Self-Hosting & Configuration

  • Available in most Linux distribution repositories and included in Kali Linux
  • Requires a wireless adapter with monitor mode and packet injection support
  • Builds from source with autotools; optional hwloc for CPU topology awareness
  • No configuration files; all options are passed via command-line flags
  • Works on Linux, FreeBSD, macOS, and Windows (with limited driver support)

Key Features

  • WPA/WPA2 PSK cracking with dictionary and brute-force attacks
  • PMKID-based attack for clientless WPA handshake capture
  • WEP cracking via FMS, KoreK, and PTW statistical attacks
  • Packet injection for deauthentication, fake authentication, and replay
  • Integration with GPU cracking via Hashcat for accelerated WPA recovery

Comparison with Similar Tools

  • Bettercap — broader network MITM framework; Aircrack-ng is specialized for WiFi-layer attacks
  • Kismet — passive wireless detection and monitoring; Aircrack-ng adds active attack capabilities
  • Wifite — automated WiFi auditing wrapper around Aircrack-ng and other tools
  • Hashcat — GPU-accelerated hash cracking; often used alongside Aircrack-ng for WPA key recovery
  • Reaver — focused on WPS PIN brute-forcing; Aircrack-ng covers the broader WiFi assessment workflow

FAQ

Q: What wireless adapters work with Aircrack-ng? A: Adapters with chipsets supporting monitor mode and injection, such as Atheros AR9271, Ralink RT3070, and Realtek RTL8812AU, are commonly recommended.

Q: Can it crack WPA3? A: WPA3 uses Simultaneous Authentication of Equals (SAE), which resists offline dictionary attacks. Aircrack-ng's WPA cracking targets WPA/WPA2 PSK handshakes.

Q: Is monitor mode required? A: Most offensive features require monitor mode. Some analysis and cracking operations can work on previously captured pcap files without live hardware.

Q: How long does WPA cracking take? A: Speed depends on the wordlist size and hardware. CPU-based cracking processes thousands of keys per second; GPU-accelerated cracking via Hashcat reaches millions per second.

Sources

Discusión

Inicia sesión para unirte a la discusión.
Aún no hay comentarios. Sé el primero en compartir tus ideas.

Activos relacionados