Aircrack‑ng
E20656
Aircrack‑ng is an open-source suite of tools used for auditing and cracking Wi‑Fi network security, including WEP and WPA/WPA2 encryption.
Aliases (8)
Statements (86)
| Predicate | Object |
|---|---|
| instanceOf |
Wi-Fi security auditing tool
→
network security tool → open-source software → software suite → |
| canCrackEncryption |
WEP
→
WPA → WPA2-PSK → |
| category |
penetration testing framework
→
security software → wireless security software → |
| component |
airbase-ng (wireless attack tool)
→
aircrack-ng (key cracking tool) → airdecap-ng (WEP/WPA decryption tool) → airdriver-ng (driver management tool, deprecated in some distros) → aireplay-ng (packet injection tool) → airmon-ng (monitor mode management tool) → airmon-zc (newer monitor mode script) → airodump-ng (packet capture tool) → airserv-ng (remote capture daemon) → ivstools (IV file tools) → packetforge-ng (packet creation tool) → |
| documentation |
https://www.aircrack-ng.org/doku.php
→
|
| homepage |
https://www.aircrack-ng.org/
→
|
| intendedUse |
Wi-Fi security auditing
→
penetration testing → security research → |
| license |
GPL-2.0-or-later
→
|
| notableDistribution |
Kali Linux
→
Parrot Security OS → |
| primaryDomain |
Wi-Fi security
→
wireless network penetration testing → |
| programmingLanguage |
C
→
C++ → |
| relatedProject |
Hashcat
→
Kismet → Reaver (WPS attack tool) → Wireshark → |
| requiresHardware |
wireless network interface card supporting monitor mode
→
wireless network interface card supporting packet injection → |
| requiresPermission |
administrative privileges on host system
→
|
| securityModel |
offensive security testing
→
|
| softwareType |
wireless network security suite
→
|
| sourceCodeRepository |
https://github.com/aircrack-ng/aircrack-ng
→
|
| supportsAttackType |
ARP replay attack
→
FMS attack on WEP → PTW attack on WEP → brute-force attack → deauthentication attack → dictionary attack → statistical attack on WEP → |
| supportsFeature |
GPU acceleration via external tools
→
Korek attacks → PMKID capture → WEP key recovery → WPA/WPA2 PSK cracking using wordlists → WPA/WPA2 handshake cracking → chopchop attack → fake authentication → fragmentation attacks → handshake capture → monitor mode capture → packet injection → traffic capture and analysis → wireless network discovery → |
| supportsFileFormat |
.cap (pcap capture files)
→
.hccapx (via conversion tools) → .ivs (IVS capture files) → |
| supportsLanguage |
English (documentation)
→
|
| supportsOperatingSystem |
Android (via ports)
→
BSD → Linux → Solaris → Windows → macOS → |
| supportsPlatform |
command-line interface
→
|
| supportsProtocol |
EAPOL (for handshake capture)
→
WEP → WPA-PSK → WPA2-PSK → |
| supportsStandard |
IEEE 802.11
→
|
| supportsUseCase |
auditing enterprise and home Wi-Fi networks
→
capturing WPA/WPA2 4-way handshakes → testing strength of Wi-Fi passwords → |
| writtenFor |
network administrators
→
penetration testers → security professionals → |
Referenced by (9)
| Subject (surface form when different) | Predicate |
|---|---|
|
Aircrack-ng
("aircrack-ng (key cracking tool)")
→
Aircrack-ng ("airmon-ng (monitor mode management tool)") → Aircrack-ng ("airodump-ng (packet capture tool)") → Aircrack-ng ("aireplay-ng (packet injection tool)") → Aircrack-ng ("airbase-ng (wireless attack tool)") → Aircrack-ng ("airdecap-ng (WEP/WPA decryption tool)") → |
component |
|
Kali Linux
("Aircrack-ng")
→
Kali Linux ("wifite") → |
includesTool |
|
Wired Equivalent Privacy
→
|
attackToolExample |