aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is a set of tools for auditing wireless networks.
Aircrack-ng is the next generation of aircrack with lots of new features:
- Better documentation (wiki, manpages) and support (Forum, trac, IRC: #aircrack-ng on Freenode).
- More cards/drivers supported
- New WEP attack: PTW
- More OS and platforms supported
- Fragmentation attack
- Improved cracking speed
- WEP dictionary attack
- Capture with multiple cards
- New tools: airtun-ng, packetforge-ng (improved arpforge), wesside-ng and airserv-ng
- Optimizations, other improvements and bug fixing
Download the latest version of aircrack-ng here:
Linux – aircrack-ng-0.9.1.tar.gz
Windows – aircrack-ng-0.9.1-win.zip
Or you can read more here.
Remember you need this to use aircrack-ptw – the fast WEP cracking tool.
Sir Henry says
From the aircrack-ng site:
“Because it is very compute intensive, a computer can only test 50 to 300 possible keys per second depending on the computer CPU. It can take hours, if not days, to crunch through a large dictionary.”
I wonder if a graphics card (from your similar post) could be used to aid the computational power. Do you know if anyone has tried that or would it simply be the same as they had mentioned in the article?
junaid says
Have you tried airolib-ng ?
valioe says
the windows version is broken =(
Bogwitch says
I’ve used the windows version – it works fine. Your implementation is probably broken. It’s probably a wetware issue.