Cette page est affichée en anglais. Une traduction française est en cours.
ConfigsMay 15, 2026·3 min de lecture

Aircrack-ng — WiFi Network Security Auditing Suite

A complete suite of WiFi security tools for monitoring, attacking, testing, and cracking wireless networks, used by security professionals for authorized WiFi assessments.

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Needs Confirmation · 64/100Policy : confirmer
Surface agent
Tout agent MCP/CLI
Type
Skill
Installation
Single
Confiance
Confiance : Established
Point d'entrée
Aircrack-ng Overview
Commande CLI universelle
npx tokrepo install 0f49b63d-509c-11f1-9bc6-00163e2b0d79

Introduction

Aircrack-ng is a network security toolkit focused on WiFi security assessment. It provides tools for packet capture, deauthentication testing, WEP/WPA cracking, and wireless network analysis. It is a standard tool in penetration testing distributions and is used by security professionals to audit the strength of wireless network configurations.

What Aircrack-ng Does

  • Captures raw 802.11 frames in monitor mode for offline analysis
  • Cracks WEP keys using statistical attacks on captured initialization vectors
  • Recovers WPA/WPA2 pre-shared keys by testing captured handshakes against wordlists
  • Tests network resilience with deauthentication and fake access point injection
  • Analyzes packet captures for reconnaissance and traffic pattern identification

Architecture Overview

Aircrack-ng is written in C with a modular design where each tool handles a specific function. Airmon-ng manages monitor mode interfaces, airodump-ng captures packets, aireplay-ng injects frames, and aircrack-ng performs key recovery. The cracking engine uses optimized PBKDF2-SHA1 implementations with SIMD acceleration (SSE2, AVX2) for WPA key derivation. Tools communicate via standard pcap capture files.

Self-Hosting & Configuration

  • Available in most Linux distribution repositories and included in Kali Linux
  • Requires a wireless adapter with monitor mode and packet injection support
  • Builds from source with autotools; optional hwloc for CPU topology awareness
  • No configuration files; all options are passed via command-line flags
  • Works on Linux, FreeBSD, macOS, and Windows (with limited driver support)

Key Features

  • WPA/WPA2 PSK cracking with dictionary and brute-force attacks
  • PMKID-based attack for clientless WPA handshake capture
  • WEP cracking via FMS, KoreK, and PTW statistical attacks
  • Packet injection for deauthentication, fake authentication, and replay
  • Integration with GPU cracking via Hashcat for accelerated WPA recovery

Comparison with Similar Tools

  • Bettercap — broader network MITM framework; Aircrack-ng is specialized for WiFi-layer attacks
  • Kismet — passive wireless detection and monitoring; Aircrack-ng adds active attack capabilities
  • Wifite — automated WiFi auditing wrapper around Aircrack-ng and other tools
  • Hashcat — GPU-accelerated hash cracking; often used alongside Aircrack-ng for WPA key recovery
  • Reaver — focused on WPS PIN brute-forcing; Aircrack-ng covers the broader WiFi assessment workflow

FAQ

Q: What wireless adapters work with Aircrack-ng? A: Adapters with chipsets supporting monitor mode and injection, such as Atheros AR9271, Ralink RT3070, and Realtek RTL8812AU, are commonly recommended.

Q: Can it crack WPA3? A: WPA3 uses Simultaneous Authentication of Equals (SAE), which resists offline dictionary attacks. Aircrack-ng's WPA cracking targets WPA/WPA2 PSK handshakes.

Q: Is monitor mode required? A: Most offensive features require monitor mode. Some analysis and cracking operations can work on previously captured pcap files without live hardware.

Q: How long does WPA cracking take? A: Speed depends on the wordlist size and hardware. CPU-based cracking processes thousands of keys per second; GPU-accelerated cracking via Hashcat reaches millions per second.

Sources

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires