HP: Adds the Sure Sense malware blocker to its new devices

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More

EXCLUSIVE: Strong attack by hackers on the Greek Register of .gr!

After updating the SecNews reader, Fotis Mavrakis, from the friendly website www.RetroComputers.gr, the Registry of Domain Names with ...
Read More

EthiHak 2019: The final ten!

For another year, the big fight ended, the screens went out and EthiHak's two-day weekend would leave ...
Read More
Latest Posts

Truths and lies about Aircrack-ng

Aircrack-ng: In this article, I took the initiative to express my view of the security culture (and nausea often). I have seen dozens of videos on the internet and I have received hundreds of times the questions "how will I find my Facebook code" and more often "how can I find my WiFi code next to me"? So I went into the tap to check the WiFi of my entire neighborhood to see how likely it is to find the code in one of them.Aircrack-ng
The test I did in the last 3 days with the famous Linux distribution, Kali! I used the well-known Aircrack-ng program and the computer on 3 days tested libraries on some random networks (including my own). The result; I will tell you below!

Basically, what is Aircrack-ng and how does it work?

The Aircrack-ng (in very few words) is a suite that monitors, analyzes and attacks WiFi networks. The result of the analysis is the file.cap or else, capture file which we will analyze through Aircrack-ng to compare passwords.

How does the above method work and what is the probability of finding the code in a random access point?

When we get to the step we have created the file.cap and compare it with a code library that we downloaded from a torrent, the result is: Or find the code of the particular WiFi, or the code is not included in the library and we do not have the result . Please state in the second case, DO NOT INCLUDE THE CODE IN THE LIBRARY.

In the last 3 days I tested around 30 million passwords from 4 passphrase libraries over over 4 neighboring WiFi networks and the result was a nice NO (certainly there are others but the result would be the same with just a lot of lost scan times) ! So will you tell me now, what is the usefulness of Aircrack-ng?

What are code libraries?

Code libraries are, as their name implies, lists with millions of alphanumeric codes already used by various routers and collected by various users.

How likely is there to be a WiFi WiFi passcode or passcode?

Almost zero! If our code not is "123456", "abcdefg", some random number like date of birth, movie name, or famous person (rock band), the odds of being found are infinitesimal! In short, if our code is of the '@ 65Hj ^ $ bnhKj78 @!' Style, there is no way it can be found at Aircrack-ng.

What is the usefulness of Aircrack-ng?

It diminishes the chances of someone getting our network code and importing it into a library so that someone who will look for it can actually do it. The usefulness and positive effect of Aircrack-ng is precisely that, fail the test and not to succeed! Do not forget that it is a tool for pentesters and not for malicious use! So if I scanned a network with this program, the positive result is that the network code does not exist in the libraries everyone finds online!

So videos that are on-line with different types that "break" in all their cases for "moral" reasons their own network and not neighbors, are mute! They simply aim at views! Yes, the process is right, but the result is misinformed! The success of each video is due to the fact that they enter their code before the test in the library, which they will then analyze and as is perfectly reasonable, in the program the code verifies the code! Having no idea how this program works, he thinks something exciting! Am ...

How can we protect ourselves from this?

Just make sure we give the key to our network!

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *