![]() ![]() Now that you know what the aircrack-ng suite is, we are going to briefly explain all the tools that we have incorporated and how each of them is used. This project of the Aircrack-ng suite is more alive than ever, and it is that they have recently released the latest version 1.7 with a large number of improvements in operation, optimization of commands and new options, all this after 2 years since the previous one version. It is also true that we can take advantage of this to have graphical user interfaces, but there comes a time when using the command line is much faster. In the vast majority of cases, if you want to perform wireless audits, you are going to use a Linux-based operating system since we will have perfect compatibility, especially due to the drivers of the different WiFi network cards since they usually support monitor and injection mode of packages.Ī very important aspect is that this suite of programs is available by default in the popular Kali Linux distributions and also in WifiSlax, this last distribution is specifically designed for Wi-Fi wireless audits.Īnother very important feature is that all the tools are executed through the command line, this allows you to automate different attacks based on scripts. This software is compatible with Windows, Linux, Unix and macOS operating systems, in fact, we have the source code available so that we can compile it ourselves in our operating system. Cracking – Allows you to directly crack WEP, WPA, and WPA2 dictionary-based or brute-force encryption.Testing : we will be able to check if the WiFi card is compatible with the different attacks, and also if we can configure it in monitor mode and if it is capable of injecting packets into the network.Attacks : we can do replay attacks, deauthentication attacks, set up a fake access point for victims to connect to, and even inject packets into the wireless network.For example, we can capture all the WiFi network packets and analyze them with the WireShark program. ![]() Monitoring : this software allows you to capture all the packets of a wireless network, export the data to text files and also to other formats to be analyzed by other programs.This security suite focuses specifically on four distinct areas of cybersecurity in wireless networks: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |