Update Aircrack-ng.md

main
$./Netrunner_& 11 months ago committed by GitHub
parent 346c0eeefb
commit e48cdf98ac
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,116 +1,74 @@
Certainly! Here's your Aircrack-ng cheatsheet formatted for GitHub Markdown. You can save this content into a `.md` file, such as `aircrack-ng-cheatsheet.md`, and then upload it to GitHub. <!DOCTYPE html>
<html>
```markdown <head>
# Aircrack-ng Cheatsheet 🚀 <title>Aircrack-ng Cheatsheet</title>
<style>
Aircrack-ng is a comprehensive toolkit for auditing wireless networks. This cheatsheet outlines the key tools and usages. body {
font-family: Arial, sans-serif;
## Table of Contents }
1. [Airmon-ng](#1-airmon-ng-) h1, h2, h3 {
2. [Airodump-ng](#2-airodump-ng-) color: #333;
3. [Aireplay-ng](#3-aireplay-ng-) }
4. [Aircrack-ng](#4-aircrack-ng-) code {
5. [Conversion to .pcapng](#5-conversion-to-pcapng-) background-color: #f0f0f0;
padding: 2px;
--- border-radius: 4px;
}
## 1. Airmon-ng ⚙️ pre {
background-color: #f8f8f8;
Puts your wireless card into monitor mode for packet sniffing. padding: 10px;
border-radius: 4px;
```bash }
airmon-ng start wlan0 </style>
``` </head>
<body>
- Initializes monitor mode on `wlan0`
- Generates a virtual monitor interface, typically named `wlan0mon` <h1>Aircrack-ng Cheatsheet 🚀</h1>
**To stop monitor mode:** <p>Aircrack-ng is a comprehensive toolkit for auditing wireless networks.</p>
```bash <h2>Table of Contents</h2>
airmon-ng stop wlan0mon <ul>
``` <li><a href="#airmon">Airmon-ng</a></li>
<li><a href="#airodump">Airodump-ng</a></li>
--- <li><a href="#aireplay">Aireplay-ng</a></li>
<li><a href="#aircrack">Aircrack-ng</a></li>
## 2. Airodump-ng 📡 <li><a href="#conversion">Conversion to .pcapng</a></li>
</ul>
Captures raw 802.11 packets and displays information about nearby wireless networks.
<h2 id="airmon">1. Airmon-ng ⚙️</h2>
**To capture all packets:** <pre>
<code>airmon-ng start wlan0</code>
```bash </pre>
airodump-ng wlan0mon <p>Initializes monitor mode on <code>wlan0</code>. Generates a virtual monitor interface, typically named <code>wlan0mon</code>.</p>
airodump-ng wlan1 --band a //This will scan through 5ghz <pre>
``` <code>airmon-ng stop wlan0mon</code>
</pre>
**For a specific network:**
<h2 id="airodump">2. Airodump-ng 📡</h2>
```bash <pre>
airodump-ng -c [channel] --bssid [BSSID] -w [filename] wlan0mon <code>airodump-ng wlan0mon</code>
``` <code>airodump-ng wlan1 --band a</code>
</pre>
- `-c`: Channel to listen on
- `--bssid`: BSSID of the target network <h2 id="aireplay">3. Aireplay-ng 💥</h2>
- `-w`: Specifies the output file prefix <pre>
<code>aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon</code>
Airodump-ng captures and displays: </pre>
- BSSID, SSID, channel <h2 id="aircrack">4. Aircrack-ng 🔓</h2>
- Encryption type <pre>
- MAC addresses of connected clients <code>aircrack-ng -a 1 -b [BSSID] [capture.cap]</code>
- IVs captured <code>aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]</code>
</pre>
---
<h2 id="conversion">5. Conversion to .pcapng ⚙️</h2>
## 3. Aireplay-ng 💥 <pre>
<code>tshark -r [input.cap] -w [output.pcapng]</code>
Used for injecting frames to generate traffic, aiding in the cracking process. </pre>
**To deauthenticate a connected client:** <!-- Your screenshot can be added here -->
<img src="Screenshot_2023-09-29_235515.png" alt="Screenshot" />
```bash
aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon </body>
``` </html>
- `-0`: Deauthentication mode
- `1`: Number of deauth packets
- `-a`: BSSID of the target network
- `-c`: Client MAC address
---
## 4. Aircrack-ng 🔓
Cracks WEP and WPA keys.
**To crack a WEP key:**
```bash
aircrack-ng -a 1 -b [BSSID] [capture.cap]
```
**For WPA/WPA2 with dictionary attack:**
```bash
aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]
```
- `-w`: Specifies the dictionary file for passphrase cracking
---
## 5. Conversion to .pcapng ⚙️
To convert `.cap` files generated by `airodump-ng` to `.pcapng`, use `tshark`.
```bash
tshark -r [input.cap] -w [output.pcapng]
```
---
![Screenshot 2023-09-29 235515](https://prod-files-secure.s3.us-west-2.amazonaws.com/bf265c8c-d3a5-4ac6-a1a2-6ff195c8b0c7/acffe655-5392-4cf3-8f9d-b6696bbe9244/Screenshot_2023-09-29_235515.png)
```
Feel free to upload this to your GitHub repository as a valuable resource for others interested in network security.

Loading…
Cancel
Save