|
|
@ -1,116 +1,74 @@
|
|
|
|
Certainly! Here's your Aircrack-ng cheatsheet formatted for GitHub Markdown. You can save this content into a `.md` file, such as `aircrack-ng-cheatsheet.md`, and then upload it to GitHub.
|
|
|
|
<!DOCTYPE html>
|
|
|
|
|
|
|
|
<html>
|
|
|
|
```markdown
|
|
|
|
<head>
|
|
|
|
# Aircrack-ng Cheatsheet 🚀
|
|
|
|
<title>Aircrack-ng Cheatsheet</title>
|
|
|
|
|
|
|
|
<style>
|
|
|
|
Aircrack-ng is a comprehensive toolkit for auditing wireless networks. This cheatsheet outlines the key tools and usages.
|
|
|
|
body {
|
|
|
|
|
|
|
|
font-family: Arial, sans-serif;
|
|
|
|
## Table of Contents
|
|
|
|
}
|
|
|
|
1. [Airmon-ng](#1-airmon-ng-️)
|
|
|
|
h1, h2, h3 {
|
|
|
|
2. [Airodump-ng](#2-airodump-ng-)
|
|
|
|
color: #333;
|
|
|
|
3. [Aireplay-ng](#3-aireplay-ng-)
|
|
|
|
}
|
|
|
|
4. [Aircrack-ng](#4-aircrack-ng-)
|
|
|
|
code {
|
|
|
|
5. [Conversion to .pcapng](#5-conversion-to-pcapng-)
|
|
|
|
background-color: #f0f0f0;
|
|
|
|
|
|
|
|
padding: 2px;
|
|
|
|
---
|
|
|
|
border-radius: 4px;
|
|
|
|
|
|
|
|
}
|
|
|
|
## 1. Airmon-ng ⚙️
|
|
|
|
pre {
|
|
|
|
|
|
|
|
background-color: #f8f8f8;
|
|
|
|
Puts your wireless card into monitor mode for packet sniffing.
|
|
|
|
padding: 10px;
|
|
|
|
|
|
|
|
border-radius: 4px;
|
|
|
|
```bash
|
|
|
|
}
|
|
|
|
airmon-ng start wlan0
|
|
|
|
</style>
|
|
|
|
```
|
|
|
|
</head>
|
|
|
|
|
|
|
|
<body>
|
|
|
|
- Initializes monitor mode on `wlan0`
|
|
|
|
|
|
|
|
- Generates a virtual monitor interface, typically named `wlan0mon`
|
|
|
|
<h1>Aircrack-ng Cheatsheet 🚀</h1>
|
|
|
|
|
|
|
|
|
|
|
|
**To stop monitor mode:**
|
|
|
|
<p>Aircrack-ng is a comprehensive toolkit for auditing wireless networks.</p>
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
<h2>Table of Contents</h2>
|
|
|
|
airmon-ng stop wlan0mon
|
|
|
|
<ul>
|
|
|
|
```
|
|
|
|
<li><a href="#airmon">Airmon-ng</a></li>
|
|
|
|
|
|
|
|
<li><a href="#airodump">Airodump-ng</a></li>
|
|
|
|
---
|
|
|
|
<li><a href="#aireplay">Aireplay-ng</a></li>
|
|
|
|
|
|
|
|
<li><a href="#aircrack">Aircrack-ng</a></li>
|
|
|
|
## 2. Airodump-ng 📡
|
|
|
|
<li><a href="#conversion">Conversion to .pcapng</a></li>
|
|
|
|
|
|
|
|
</ul>
|
|
|
|
Captures raw 802.11 packets and displays information about nearby wireless networks.
|
|
|
|
|
|
|
|
|
|
|
|
<h2 id="airmon">1. Airmon-ng ⚙️</h2>
|
|
|
|
**To capture all packets:**
|
|
|
|
<pre>
|
|
|
|
|
|
|
|
<code>airmon-ng start wlan0</code>
|
|
|
|
```bash
|
|
|
|
</pre>
|
|
|
|
airodump-ng wlan0mon
|
|
|
|
<p>Initializes monitor mode on <code>wlan0</code>. Generates a virtual monitor interface, typically named <code>wlan0mon</code>.</p>
|
|
|
|
airodump-ng wlan1 --band a //This will scan through 5ghz
|
|
|
|
<pre>
|
|
|
|
```
|
|
|
|
<code>airmon-ng stop wlan0mon</code>
|
|
|
|
|
|
|
|
</pre>
|
|
|
|
**For a specific network:**
|
|
|
|
|
|
|
|
|
|
|
|
<h2 id="airodump">2. Airodump-ng 📡</h2>
|
|
|
|
```bash
|
|
|
|
<pre>
|
|
|
|
airodump-ng -c [channel] --bssid [BSSID] -w [filename] wlan0mon
|
|
|
|
<code>airodump-ng wlan0mon</code>
|
|
|
|
```
|
|
|
|
<code>airodump-ng wlan1 --band a</code>
|
|
|
|
|
|
|
|
</pre>
|
|
|
|
- `-c`: Channel to listen on
|
|
|
|
|
|
|
|
- `--bssid`: BSSID of the target network
|
|
|
|
<h2 id="aireplay">3. Aireplay-ng 💥</h2>
|
|
|
|
- `-w`: Specifies the output file prefix
|
|
|
|
<pre>
|
|
|
|
|
|
|
|
<code>aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon</code>
|
|
|
|
Airodump-ng captures and displays:
|
|
|
|
</pre>
|
|
|
|
|
|
|
|
|
|
|
|
- BSSID, SSID, channel
|
|
|
|
<h2 id="aircrack">4. Aircrack-ng 🔓</h2>
|
|
|
|
- Encryption type
|
|
|
|
<pre>
|
|
|
|
- MAC addresses of connected clients
|
|
|
|
<code>aircrack-ng -a 1 -b [BSSID] [capture.cap]</code>
|
|
|
|
- IVs captured
|
|
|
|
<code>aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]</code>
|
|
|
|
|
|
|
|
</pre>
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
<h2 id="conversion">5. Conversion to .pcapng ⚙️</h2>
|
|
|
|
## 3. Aireplay-ng 💥
|
|
|
|
<pre>
|
|
|
|
|
|
|
|
<code>tshark -r [input.cap] -w [output.pcapng]</code>
|
|
|
|
Used for injecting frames to generate traffic, aiding in the cracking process.
|
|
|
|
</pre>
|
|
|
|
|
|
|
|
|
|
|
|
**To deauthenticate a connected client:**
|
|
|
|
<!-- Your screenshot can be added here -->
|
|
|
|
|
|
|
|
<img src="Screenshot_2023-09-29_235515.png" alt="Screenshot" />
|
|
|
|
```bash
|
|
|
|
|
|
|
|
aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon
|
|
|
|
</body>
|
|
|
|
```
|
|
|
|
</html>
|
|
|
|
|
|
|
|
|
|
|
|
- `-0`: Deauthentication mode
|
|
|
|
|
|
|
|
- `1`: Number of deauth packets
|
|
|
|
|
|
|
|
- `-a`: BSSID of the target network
|
|
|
|
|
|
|
|
- `-c`: Client MAC address
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 4. Aircrack-ng 🔓
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cracks WEP and WPA keys.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
**To crack a WEP key:**
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
|
|
|
aircrack-ng -a 1 -b [BSSID] [capture.cap]
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
**For WPA/WPA2 with dictionary attack:**
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
|
|
|
aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- `-w`: Specifies the dictionary file for passphrase cracking
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 5. Conversion to .pcapng ⚙️
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To convert `.cap` files generated by `airodump-ng` to `.pcapng`, use `tshark`.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
|
|
|
tshark -r [input.cap] -w [output.pcapng]
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
![Screenshot 2023-09-29 235515](https://prod-files-secure.s3.us-west-2.amazonaws.com/bf265c8c-d3a5-4ac6-a1a2-6ff195c8b0c7/acffe655-5392-4cf3-8f9d-b6696bbe9244/Screenshot_2023-09-29_235515.png)
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feel free to upload this to your GitHub repository as a valuable resource for others interested in network security.
|
|
|
|
|
|
|
|