Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/
Airbase-ng Airbase-ng (cont)
Usage: airbase-ng <options> <replay interface> -Z type same as -z, but for WPA2
-V type type fake EAPOL 1=MD5 2=SHA1 3=auto
Syntax Parame Description
-F prefix write all sent and received frames into pcap file
ters
-P none respond to all probes, even when specifying
-a bssid set Access Point MAC address
ESSIDs
-i iface capture packets from this interface
-I interval sets the beacon interval value in ms
-w WEP use this WEP key to encrypt/decrypt packets
-C seconds enables beaconing of probed ESSID values
key
(requires -P)
-W 0|1 [don't] set WEP flag in beacons 0|1 (default: auto)
-h MAC source mac for MITM mode Filter Options
-f disallow disallow specified client MACs (default: allow) Syntax Paramete Description
rs
-q none quiet (do not print statistics)
-- <file> read a list of BSSIDs out of that file (short -B)
-v none verbose (print more messages) (long --verbose)
bssids
-M none M-I-T-M between [specified] clients and bssids
--bssid <MAC> BSSID to filter/use (short -b)
-A none Ad-Hoc Mode (allows other clients to peer) (long --
-- <MAC> MAC of client to accept (short -d)
ad-hoc)
client
-Y in|out|bo external packet processing
th -- <file> read a list of MACs out of that file (short -D)
clients
-c channel sets the channel the AP is running on
--essid <ESSID> specify a single ESSID (short -e)
-X none hidden ESSID (long --hidden)
-- <file> read a list of ESSIDs out of that file (short -E)
-s none force shared key authentication
essids
-S none set shared key challenge length (default: 128)
-L none Caffe-Latte attack (long --caffe-latte) Airdecloak-ng
-N none Hirte attack (cfrag attack), creates arp request Usage: airdecloak-ng [options]
against wep client (long –cfrag)
-x nbpps number of packets per second (default: 100)
Syntax Param Description
-y none disables responses to broadcast probes eter
-0 none set all WPA,WEP,open tags. can't be used with -z & -i input Path to the capture file
-Z file
-z type sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP –bssid BSSID BSSID of the network to filter.
4=CCMP 5=WEP104 –ssid ESSID ESSID of the network to filter (not yet
implemented).
–filters filters Apply theses filters in this specific order. They
have to be separated by a ','.
– none Assume that null packets can be cloaked (not yet
null-packets implemented).
– none Disable the base filter.
disable-base
_filter
By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com
cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 1 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/
Airdecloak-ng (cont) Airgraph-ng (cont)
–drop- none Drop all fragmented packets. In most networks, - Graph Type [CAPR (Client to AP Relationship) OR CPG (Common
frag fragmentation is not needed. g probe graph)]
- Print the about
Airdrop-ng
a
Usage: airdrop-ng [options] <pcap file>
- Print this help
h
Syntax Param Description
eter
Aircrack-ng
-i card Wireless card in monitor mode to inject from
Usage: aircrack-ng [options] <capture file(s)>
-t csv file Airodump txt file in CSV format NOT the pcap
-p psyco Disable the use of Psyco JIT Syntax Parame Description
-r Rule Rule File for matched deauths ter
File -a amode Force attack mode (1 = static WEP, 2 =
-u update Updates OUI list WPA/WPA2-PSK)
-d Driver Injection driver. Default is mac80211 -b bssid Long version - -bssid. Select the target network
based on the access point's MAC address.
-s sleep Time to sleep between sending each packet
-e essid If set, all IVs from networks with the same ESSID will
-b debug Turn on Rule Debugging be used. This option is also required for
WPA/WPA2-PSK cracking if the ESSID is not
-l key Enable Logging to a file, if file path not provided
broadcasted (hidden).
airdrop will log to default location
-p nbcpu On SMP systems: # of CPU to use. This option is
-n nap Time to sleep between loops
invalid on non-SMP systems
-q none Enable quiet mode (no status output until the key is
Airdecap-ng
found, or not)
Usage: airdecap-ng [options] <pcap file>
-c none (WEP cracking) Restrict the search space to
alpha-numeric characters only (0x20 - 0x7F)
Syntax Parameter Description -t none (WEP cracking) Restrict the search space to binary
-l none don't remove the 802.11 header coded decimal hex characters
-b bssid access point MAC address filter -h none (WEP cracking) Restrict the search space to numeric
characters (0x30-0x39) These keys are used by
-k pmk WPA/WPA2 Pairwise Master Key in hex default in most Fritz!BOXes
-e essid target network ascii identifier -d start (WEP cracking) Long version –debug. Set the
beginning of the WEP key (in hex), for debugging
-p pass target network WPA/WPA2 passphrase
purposes.
-w key target network WEP key in hexadecimal
-m maddr (WEP cracking) MAC address to filter WEP data
packets. Alternatively, specify -m ff:ff:ff:ff:ff:ff to use
Airgraph-ng all and every IVs, regardless of the network.
Usage: python airgraph-ng -i [airodumpfile.txt] -o -M number (WEP cracking) Sets the maximum number of ivs to
[outputfile.png] -g [CAPR OR CPG] use.
Syntax Description
-i Input File
-o Output File
By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com
cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 2 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/
Aircrack-ng (cont) Aircrack-ng (cont)
-n nbits (WEP cracking) Specify the length of the key: 64 for - none (WEP cracking) Experimental single bruteforce attack which
40-bit WEP, 128 for 104-bit WEP, etc. The default y should only be used when the standard attack mode fails
value is 128. with more than one million IVs
-i index (WEP cracking) Only keep the IVs that have this key - none Long form - -cpu-detect. Provide information on the number
index (1 to 4). The default behaviour is to ignore the u of CPUs and MMX support. Example responses to
key index. “aircrack-ng - -cpu-detect” are “Nb CPU detected: 2” or “Nb
-f fudge (WEP cracking) By default, this parameter is set to 2 CPU detected: 1 (MMX available)”.
for 104-bit WEP and to 5 for 40-bit WEP. Specify a - words (WPA cracking) Path to a wordlist or “-” without the quotes
higher value to increase the bruteforce level: cracking w for standard in (stdin).
will take more time, but with a higher likelyhood of
- none Invokes the PTW WEP cracking method. (Default in v1.x)
success.
z
-H none Long version - -help. Output help information.
- none Long version - -ptw-debug. Invokes the PTW debug mode.
-l file name (Lowercase L, ell) logs the key to the file specified.
P
-K none Invokes the Korek WEP cracking method. (Default in
- MACs Long version - -combine. Merge the given APs to a virtual
v0.x)
C one.
-k korek (WEP cracking) There are 17 korek statistical attacks.
Sometimes one attack creates a huge false positive - none Long version - -wep-decloak. Run in WEP decloak mode.
that prevents the key from being found, even with lots D
of IVs. Try -k 1, -k 2, … -k 17 to disable each attack
- none Long version - -visual-inspection. Run in visual inspection
selectively.
V mode.
-p threads Allow the number of threads for cracking even if you
have a non-SMP computer. - none Long version - -oneshot. Run in oneshot mode.
-r database Utilizes a database generated by airolib-ng as input to 1
determine the WPA key. Outputs an error message if - none WPA cracking speed test.
aircrack-ng has not been compiled with sqlite support.
S
- none (WEP cracking) Disable last keybytes brutforce.
- none Show the key in ASCII while cracking
x/-
s
x0
- file> (WPA cracking) Create EWSA Project file v3
- none (WEP cracking) Enable last keybyte bruteforcing
E
x1 (default).
- file (WPA cracking) Create Hashcat Capture file
- none (WEP cracking) Enable last two keybytes
J
x2 bruteforcing.
-X none (WEP cracking) Disable bruteforce multithreading Aireplay-ng
(SMP only).
Usage: aireplay-ng <options> <replay interface>
Filter Options
Syntax Parameters Description
-b bssid MAC address, Access Point
-d dmac MAC address, Destination
-s smac MAC address, Source
-m len minimum packet length
By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com
cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 3 of 4. https://apollopad.com
Aircrack-ng Suite Cheat Sheet
by itnetsec via cheatography.com/21064/cs/6776/
Aireplay-ng (cont) Aireplay-ng (cont)
-n len maximum packet length -R none disables /dev/rtc usage. Some systems experience
lockups or other problems with RTC. This disables the
-u type frame control, type field
usage.
-v subt frame control, subtype field
-t tods frame control, To DS bit Source options
-f fromds frame control, From DS bit Syntax Para‐ Description
mete‐
-w iswep frame control, WEP bit
rs
iface none capture packets from this interface
Replay Options
-r file extract packets from this pcap file
Syntax Param Description
eters
Attack modes
-x nbpps number of packets per second
Syntax Para‐ Description
-p fctrl set frame control word (hex)
mete‐
-a bssid set Access Point MAC address rs
-c dmac set Destination MAC address -- count deauthenticate 1 or all stations (-0)
-h smac set Source MAC address deauth
-e essid For fakeauth attack or injection test, it sets target AP -- delay fake authentication with AP (-1)
SSID. This is optional when the SSID is not hidden. fakeau
-j none arpreplay attack, inject FromDS pkts th
-g value change ring buffer size (default: 8) -- none interactive frame selection (-2)
inter
-k IP set destination IP in fragments
active
-l IP set source IP in fragments
-- none standard ARP-request replay (-3)
-o npckts number of packets per burst (-1)
arprep
-q sec seconds between keep-alives (-1) lay
-y prga keystream for shared key auth -- none decrypt/chopchop WEP packet (-4)
chopch
-B or – none bit rate test (Applies only to test mode)
bittest op
-- none generates valid keystream (-5)
-D none disables AP detection. Some modes will not proceed
if the AP beacon is not heard. This disables this fragme
functionality. nt
-F or – none chooses first matching packet. For test mode, it just --test none injection test (-9)
fast checks basic injection and skips all other tests.
By itnetsec Published 28th January, 2016. Sponsored by ApolloPad.com
cheatography.com/itnetsec/ Last updated 28th January, 2016. Everyone has a novel in them. Finish Yours!
Page 4 of 4. https://apollopad.com