0% found this document useful (0 votes)
321 views4 pages

Aircrack NG Suite

The document provides a cheat sheet for the Aircrack-ng suite of tools for wireless network auditing and security. It lists the main commands (Airbase-ng, Airdecloak-ng, Airdrop-ng, Airgraph-ng, Aircrack-ng), outlines their basic syntax and parameters, and provides brief descriptions of common options.

Uploaded by

jojo smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views4 pages

Aircrack NG Suite

The document provides a cheat sheet for the Aircrack-ng suite of tools for wireless network auditing and security. It lists the main commands (Airbase-ng, Airdecloak-ng, Airdrop-ng, Airgraph-ng, Aircrack-ng), outlines their basic syntax and parameters, and provides brief descriptions of common options.

Uploaded by

jojo smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Aircrack-ng Suite Cheat Sheet

by itnetsec via cheatography.com/21064/cs/6776/

Airbase-ng Airbase-ng (cont)

Usage: airba​se-ng <op​tio​ns> <replay interf​ace​> -Z type same as -z, but for WPA2

-V type type fake EAPOL 1=MD5 2=SHA1 3=auto


Syntax Para​me Desc​rip​tion
-F prefix write all sent and received frames into pcap file
t​ers
-P none respond to all probes, even when specifying
-a bssid set Access Point MAC address
ESSIDs
-i iface capture packets from this interface
-I interval sets the beacon interval value in ms
-w WEP use this WEP key to encryp​t/d​ecrypt packets
-C seconds enables beaconing of probed ESSID values
key
(requires -P)
-W 0|1 [don't] set WEP flag in beacons 0|1 (default: auto)

-h MAC source mac for MITM mode Filter Options

-f disallow disallow specified client MACs (default: allow) Syntax Para​met​e Desc​rip​tion
rs
-q none quiet (do not print statis​tics)
-- <f​ile​> read a list of BSSIDs out of that file (short -B)
-v none verbose (print more messages) (long --verbose)
bssids
-M none M-I-T-M between [speci​fied] clients and bssids
--bssid <M​AC> BSSID to filter/use (short -b)
-A none Ad-Hoc Mode (allows other clients to peer) (long --
-- <M​AC> MAC of client to accept (short -d)
ad-hoc)
client
-Y in|ou​t|bo external packet processing
th -- <f​ile​> read a list of MACs out of that file (short -D)
cli​ents
-c channel sets the channel the AP is running on
--essid <E​SSI​D> specify a single ESSID (short -e)
-X none hidden ESSID (long --hidden)
-- <f​ile​> read a list of ESSIDs out of that file (short -E)
-s none force shared key authen​tic​ation
essids
-S none set shared key challenge length (default: 128)

-L none Caffe-​Latte attack (long --caff​e-l​atte) Airdec​loak-ng

-N none Hirte attack (cfrag attack), creates arp request Usage: airde​clo​ak-ng [options]
against wep client (long –cfrag)

-x nbpps number of packets per second (default: 100)


Syntax Para​m Desc​rip​tion
-y none disables responses to broadcast probes eter

-0 none set all WPA,WE​P,open tags. can't be used with -z & -i input Path to the capture file
-Z file

-z type sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP –bssid BSSID BSSID of the network to filter.
4=CCMP 5=WEP104 –ssid ESSID ESSID of the network to filter (not yet
implem​ented).

–filters filters Apply theses filters in this specific order. They


have to be separated by a ','.

– none Assume that null packets can be cloaked (not yet


null-​packets implem​ented).

– none Disable the base filter.


disab​le-​bas​e
_f​ilter

By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com


cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 1 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/

Airdec​loak-ng (cont) Airgra​ph-ng (cont)

–drop- none Drop all fragmented packets. In most networks, - Graph Type [CAPR (Client to AP Relati​onship) OR CPG (Common
frag fragme​ntation is not needed. g probe graph)]

- Print the about


Airdrop-ng
a
Usage: airdr​op-ng [options] <pcap file>
- Print this help
h
Syntax Para​m Desc​rip​tion
eter
Aircra​ck-ng
-i card Wireless card in monitor mode to inject from
Usage: aircr​ack-ng [options] <ca​pture file(s​)>
-t csv file Airodump txt file in CSV format NOT the pcap

-p psyco Disable the use of Psyco JIT Syntax Para​me Desc​rip​tion

-r Rule Rule File for matched deauths ter

File -a amode Force attack mode (1 = static WEP, 2 =


-u update Updates OUI list WPA/WP​A2-PSK)

-d Driver Injection driver. Default is mac80211 -b bssid Long version - -bssid. Select the target network
based on the access point's MAC address.
-s sleep Time to sleep between sending each packet
-e essid If set, all IVs from networks with the same ESSID will
-b debug Turn on Rule Debugging be used. This option is also required for
WPA/WP​A2-PSK cracking if the ESSID is not
-l key Enable Logging to a file, if file path not provided
broadc​asted (hidden).
airdrop will log to default location
-p nbcpu On SMP systems: # of CPU to use. This option is
-n nap Time to sleep between loops
invalid on non-SMP systems

-q none Enable quiet mode (no status output until the key is
Airdec​ap-ng
found, or not)
Usage: airde​cap-ng [options] <pcap file>
-c none (WEP cracking) Restrict the search space to
alpha-​numeric characters only (0x20 - 0x7F)
Syntax Para​meter Desc​rip​tion -t none (WEP cracking) Restrict the search space to binary
-l none don't remove the 802.11 header coded decimal hex characters

-b bssid access point MAC address filter -h none (WEP cracking) Restrict the search space to numeric
characters (0x30-​0x39) These keys are used by
-k pmk WPA/WPA2 Pairwise Master Key in hex default in most Fritz!​BOXes
-e essid target network ascii identifier -d start (WEP cracking) Long version –debug. Set the
beginning of the WEP key (in hex), for debugging
-p pass target network WPA/WPA2 passphrase
purposes.
-w key target network WEP key in hexade​cimal
-m maddr (WEP cracking) MAC address to filter WEP data
packets. Altern​ati​vely, specify -m ff:ff:​ff:​ff:​ff:ff to use
Airgra​ph-ng all and every IVs, regardless of the network.

Usage: python airgra​ph-ng -i [airod​ump​fil​e.txt] -o -M number (WEP cracking) Sets the maximum number of ivs to

[outpu​tfi​le.png] -g [CAPR OR CPG] use.

Syntax Desc​rip​tion

-i Input File

-o Output File

By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com


cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 2 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/

Aircra​ck-ng (cont) Aircra​ck-ng (cont)

-n nbits (WEP cracking) Specify the length of the key: 64 for - none (WEP cracking) Experi​mental single bruteforce attack which
40-bit WEP, 128 for 104-bit WEP, etc. The default y should only be used when the standard attack mode fails
value is 128. with more than one million IVs

-i index (WEP cracking) Only keep the IVs that have this key - none Long form - -cpu-d​etect. Provide inform​ation on the number
index (1 to 4). The default behaviour is to ignore the u of CPUs and MMX support. Example responses to
key index. “aircr​ack-ng - -cpu-d​etect” are “Nb CPU detected: 2” or “Nb

-f fudge (WEP cracking) By default, this parameter is set to 2 CPU detected: 1 (MMX availa​ble)”.

for 104-bit WEP and to 5 for 40-bit WEP. Specify a - words (WPA cracking) Path to a wordlist or “-” without the quotes
higher value to increase the bruteforce level: cracking w for standard in (stdin).
will take more time, but with a higher likelyhood of
- none Invokes the PTW WEP cracking method. (Default in v1.x)
success.
z
-H none Long version - -help. Output help inform​ation.
- none Long version - -ptw-d​ebug. Invokes the PTW debug mode.
-l file name (Lowercase L, ell) logs the key to the file specified.
P
-K none Invokes the Korek WEP cracking method. (Default in
- MACs Long version - -combine. Merge the given APs to a virtual
v0.x)
C one.
-k korek (WEP cracking) There are 17 korek statis​tical attacks.
Sometimes one attack creates a huge false positive - none Long version - -wep-d​ecloak. Run in WEP decloak mode.
that prevents the key from being found, even with lots D
of IVs. Try -k 1, -k 2, … -k 17 to disable each attack
- none Long version - -visua​l-i​nsp​ection. Run in visual inspection
select​ively.
V mode.
-p threads Allow the number of threads for cracking even if you
have a non-SMP computer. - none Long version - -oneshot. Run in oneshot mode.

-r database Utilizes a database generated by airolib-ng as input to 1

determine the WPA key. Outputs an error message if - none WPA cracking speed test.
aircra​ck-ng has not been compiled with sqlite support.
S
- none (WEP cracking) Disable last keybytes brutforce.
- none Show the key in ASCII while cracking
x/-
s
x0
- file> (WPA cracking) Create EWSA Project file v3
- none (WEP cracking) Enable last keybyte brutef​orcing
E
x1 (default).
- file (WPA cracking) Create Hashcat Capture file
- none (WEP cracking) Enable last two keybytes
J
x2 brutef​orcing.

-X none (WEP cracking) Disable bruteforce multit​hre​ading Airepl​ay-ng


(SMP only).
Usag​e: airepl​ay-ng <op​tio​ns> <replay interf​ace​>

Filter Options

Syntax Para​met​ers Desc​rip​tion

-b bssid MAC address, Access Point

-d dmac MAC address, Destin​ation

-s smac MAC address, Source

-m len minimum packet length

By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com


cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 3 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/

Airepl​ay-ng (cont) Airepl​ay-ng (cont)

-n len maximum packet length -R none disables /dev/rtc usage. Some systems experience
lockups or other problems with RTC. This disables the
-u type frame control, type field
usage.
-v subt frame control, subtype field

-t tods frame control, To DS bit Source options

-f fromds frame control, From DS bit Syntax Para​‐ Desc​rip​tion


met​e‐
-w iswep frame control, WEP bit
rs

iface none capture packets from this interface


Replay Options
-r file extract packets from this pcap file
Syntax Para​m Desc​rip​tion
et​ers
Attack modes
-x nbpps number of packets per second
Syntax Para​‐ Desc​rip​tion
-p fctrl set frame control word (hex)
met​e‐
-a bssid set Access Point MAC address rs

-c dmac set Destin​ation MAC address -- count deauth​ent​icate 1 or all stations (-0)

-h smac set Source MAC address deauth

-e essid For fakeauth attack or injection test, it sets target AP -- delay fake authen​tic​ation with AP (-1)

SSID. This is optional when the SSID is not hidden. fak​eau

-j none arpreplay attack, inject FromDS pkts th

-g value change ring buffer size (default: 8) -- none intera​ctive frame selection (-2)
int​er
-k IP set destin​ation IP in fragments
a​ctive
-l IP set source IP in fragments
-- none standard ARP-re​quest replay (-3)
-o npckts number of packets per burst (-1)
arp​rep
-q sec seconds between keep-a​lives (-1) lay

-y prga keystream for shared key auth -- none decryp​t/c​hopchop WEP packet (-4)
cho​pch
-B or – none bit rate test (Applies only to test mode)
bittest op

-- none generates valid keystream (-5)


-D none disables AP detection. Some modes will not proceed
if the AP beacon is not heard. This disables this fra​gme
functi​ona​lity. nt

-F or – none chooses first matching packet. For test mode, it just --test none injection test (-9)
fast checks basic injection and skips all other tests.

By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com


cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 4 of 4. https://apollopad.com

You might also like