You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

2.5 KiB

Certainly! Here's your Aircrack-ng cheatsheet formatted for GitHub Markdown. You can save this content into a .md file, such as aircrack-ng-cheatsheet.md, and then upload it to GitHub.

# Aircrack-ng Cheatsheet 🚀

Aircrack-ng is a comprehensive toolkit for auditing wireless networks. This cheatsheet outlines the key tools and usages.

## Table of Contents
1. [Airmon-ng](#1-airmon-ng-)
2. [Airodump-ng](#2-airodump-ng-)
3. [Aireplay-ng](#3-aireplay-ng-)
4. [Aircrack-ng](#4-aircrack-ng-)
5. [Conversion to .pcapng](#5-conversion-to-pcapng-)

---

## 1. Airmon-ng ⚙️

Puts your wireless card into monitor mode for packet sniffing.

```bash
airmon-ng start wlan0
  • Initializes monitor mode on wlan0
  • Generates a virtual monitor interface, typically named wlan0mon

To stop monitor mode:

airmon-ng stop wlan0mon

2. Airodump-ng 📡

Captures raw 802.11 packets and displays information about nearby wireless networks.

To capture all packets:

airodump-ng wlan0mon
airodump-ng wlan1 --band a //This will scan through 5ghz

For a specific network:

airodump-ng -c [channel] --bssid [BSSID] -w [filename] wlan0mon
  • -c: Channel to listen on
  • --bssid: BSSID of the target network
  • -w: Specifies the output file prefix

Airodump-ng captures and displays:

  • BSSID, SSID, channel
  • Encryption type
  • MAC addresses of connected clients
  • IVs captured

3. Aireplay-ng 💥

Used for injecting frames to generate traffic, aiding in the cracking process.

To deauthenticate a connected client:

aireplay-ng -0 1 -a [BSSID] -c [client MAC] wlan0mon
  • -0: Deauthentication mode
  • 1: Number of deauth packets
  • -a: BSSID of the target network
  • -c: Client MAC address

4. Aircrack-ng 🔓

Cracks WEP and WPA keys.

To crack a WEP key:

aircrack-ng -a 1 -b [BSSID] [capture.cap]

For WPA/WPA2 with dictionary attack:

aircrack-ng -a 2 -b [BSSID] -w [dictionary.txt] [capture.cap]
  • -w: Specifies the dictionary file for passphrase cracking

5. Conversion to .pcapng ⚙️

To convert .cap files generated by airodump-ng to .pcapng, use tshark.

tshark -r [input.cap] -w [output.pcapng]

Screenshot 2023-09-29 235515


Feel free to upload this to your GitHub repository as a valuable resource for others interested in network security.