Update Aircrack-ng.md

main
$./Netrunner_& 1 year ago committed by GitHub
parent 346c0eeefb
commit e48cdf98ac
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,116 +1,74 @@
Certainly! Here's your Aircrack-ng cheatsheet formatted for GitHub Markdown. You can save this content into a `.md` file, such as `aircrack-ng-cheatsheet.md`, and then upload it to GitHub.
```markdown
# Aircrack-ng Cheatsheet 🚀
Aircrack-ng is a comprehensive toolkit for auditing wireless networks. This cheatsheet outlines the key tools and usages.
## Table of Contents
1. [Airmon-ng](#1-airmon-ng-)
2. [Airodump-ng](#2-airodump-ng-)
3. [Aireplay-ng](#3-aireplay-ng-)
4. [Aircrack-ng](#4-aircrack-ng-)
5. [Conversion to .pcapng](#5-conversion-to-pcapng-)
---
## 1. Airmon-ng ⚙️
Puts your wireless card into monitor mode for packet sniffing.
```bash
airmon-ng start wlan0
```
- Initializes monitor mode on `wlan0`
- Generates a virtual monitor interface, typically named `wlan0mon`
**To stop monitor mode:**
```bash
airmon-ng stop wlan0mon
```
---
## 2. Airodump-ng 📡
Captures raw 802.11 packets and displays information about nearby wireless networks.
**To capture all packets:**
```bash
airodump-ng wlan0mon
airodump-ng wlan1 --band a //This will scan through 5ghz
```
**For a specific network:**
```bash
airodump-ng -c [channel] --bssid [BSSID] -w [filename] wlan0mon
```
- `-c`: Channel to listen on
- `--bssid`: BSSID of the target network
- `-w`: Specifies the output file prefix
Airodump-ng captures and displays:
- BSSID, SSID, channel
- Encryption type
- MAC addresses of connected clients
- IVs captured
---
## 3. Aireplay-ng 💥
Used for injecting frames to generate traffic, aiding in the cracking process.
**To deauthenticate a connected client:**
```bash
aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon
```
- `-0`: Deauthentication mode
- `1`: Number of deauth packets
- `-a`: BSSID of the target network
- `-c`: Client MAC address
---
## 4. Aircrack-ng 🔓
Cracks WEP and WPA keys.
**To crack a WEP key:**
```bash
aircrack-ng -a 1 -b [BSSID] [capture.cap]
```
**For WPA/WPA2 with dictionary attack:**
```bash
aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]
```
- `-w`: Specifies the dictionary file for passphrase cracking
---
## 5. Conversion to .pcapng ⚙️
To convert `.cap` files generated by `airodump-ng` to `.pcapng`, use `tshark`.
```bash
tshark -r [input.cap] -w [output.pcapng]
```
---
![Screenshot 2023-09-29 235515](https://prod-files-secure.s3.us-west-2.amazonaws.com/bf265c8c-d3a5-4ac6-a1a2-6ff195c8b0c7/acffe655-5392-4cf3-8f9d-b6696bbe9244/Screenshot_2023-09-29_235515.png)
```
Feel free to upload this to your GitHub repository as a valuable resource for others interested in network security.
<!DOCTYPE html>
<html>
<head>
<title>Aircrack-ng Cheatsheet</title>
<style>
body {
font-family: Arial, sans-serif;
}
h1, h2, h3 {
color: #333;
}
code {
background-color: #f0f0f0;
padding: 2px;
border-radius: 4px;
}
pre {
background-color: #f8f8f8;
padding: 10px;
border-radius: 4px;
}
</style>
</head>
<body>
<h1>Aircrack-ng Cheatsheet 🚀</h1>
<p>Aircrack-ng is a comprehensive toolkit for auditing wireless networks.</p>
<h2>Table of Contents</h2>
<ul>
<li><a href="#airmon">Airmon-ng</a></li>
<li><a href="#airodump">Airodump-ng</a></li>
<li><a href="#aireplay">Aireplay-ng</a></li>
<li><a href="#aircrack">Aircrack-ng</a></li>
<li><a href="#conversion">Conversion to .pcapng</a></li>
</ul>
<h2 id="airmon">1. Airmon-ng ⚙️</h2>
<pre>
<code>airmon-ng start wlan0</code>
</pre>
<p>Initializes monitor mode on <code>wlan0</code>. Generates a virtual monitor interface, typically named <code>wlan0mon</code>.</p>
<pre>
<code>airmon-ng stop wlan0mon</code>
</pre>
<h2 id="airodump">2. Airodump-ng 📡</h2>
<pre>
<code>airodump-ng wlan0mon</code>
<code>airodump-ng wlan1 --band a</code>
</pre>
<h2 id="aireplay">3. Aireplay-ng 💥</h2>
<pre>
<code>aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon</code>
</pre>
<h2 id="aircrack">4. Aircrack-ng 🔓</h2>
<pre>
<code>aircrack-ng -a 1 -b [BSSID] [capture.cap]</code>
<code>aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]</code>
</pre>
<h2 id="conversion">5. Conversion to .pcapng ⚙️</h2>
<pre>
<code>tshark -r [input.cap] -w [output.pcapng]</code>
</pre>
<!-- Your screenshot can be added here -->
<img src="Screenshot_2023-09-29_235515.png" alt="Screenshot" />
</body>
</html>

Loading…
Cancel
Save