Usage: aircrack-ng [options] <capture file(s)>
|
|
Syntax |
Parameter |
Description |
|
amode |
Force attack mode (1 = static WEP, 2 = WPA/WPA2-PSK) |
|
bssid |
Long version - -bssid. Select the target network based on the access point's MAC address. |
|
essid |
If set, all IVs from networks with the same ESSID will be used. This option is also required for WPA/WPA2-PSK cracking if the ESSID is not broadcasted (hidden). |
|
nbcpu |
On SMP systems: # of CPU to use. This option is invalid on non-SMP systems |
|
none |
Enable quiet mode (no status output until the key is found, or not) |
|
none |
(WEP cracking) Restrict the search space to alpha-numeric characters only (0x20 - 0x7F) |
|
none |
(WEP cracking) Restrict the search space to binary coded decimal hex characters |
|
none |
(WEP cracking) Restrict the search space to numeric characters (0x30-0x39) These keys are used by default in most Fritz!BOXes |
|
start |
(WEP cracking) Long version –debug. Set the beginning of the WEP key (in hex), for debugging purposes. |
|
maddr |
(WEP cracking) MAC address to filter WEP data packets. Alternatively, specify -m ff:ff:ff:ff:ff:ff to use all and every IVs, regardless of the network. |
|
number |
(WEP cracking) Sets the maximum number of ivs to use. |
|
nbits |
(WEP cracking) Specify the length of the key: 64 for 40-bit WEP, 128 for 104-bit WEP, etc. The default value is 128. |
|
index |
(WEP cracking) Only keep the IVs that have this key index (1 to 4). The default behaviour is to ignore the key index. |
|
fudge |
(WEP cracking) By default, this parameter is set to 2 for 104-bit WEP and to 5 for 40-bit WEP. Specify a higher value to increase the bruteforce level: cracking will take more time, but with a higher likelyhood of success. |
|
none |
Long version - -help. Output help information. |
|
file name |
(Lowercase L, ell) logs the key to the file specified. |
|
none |
Invokes the Korek WEP cracking method. (Default in v0.x) |
|
korek |
(WEP cracking) There are 17 korek statistical attacks. Sometimes one attack creates a huge false positive that prevents the key from being found, even with lots of IVs. Try -k 1, -k 2, … -k 17 to disable each attack selectively. |
|
threads |
Allow the number of threads for cracking even if you have a non-SMP computer. |
|
database |
Utilizes a database generated by airolib-ng as input to determine the WPA key. Outputs an error message if aircrack-ng has not been compiled with sqlite support. |
|
none |
(WEP cracking) Disable last keybytes brutforce. |
|
none |
(WEP cracking) Enable last keybyte bruteforcing (default). |
|
none |
(WEP cracking) Enable last two keybytes bruteforcing. |
|
none |
(WEP cracking) Disable bruteforce multithreading (SMP only). |
|
none |
(WEP cracking) Experimental single bruteforce attack which should only be used when the standard attack mode fails with more than one million IVs |
|
none |
Long form - -cpu-detect. Provide information on the number of CPUs and MMX support. Example responses to “aircrack-ng - -cpu-detect” are “Nb CPU detected: 2” or “Nb CPU detected: 1 (MMX available)”. |
|
words |
(WPA cracking) Path to a wordlist or “-” without the quotes for standard in (stdin). |
|
none |
Invokes the PTW WEP cracking method. (Default in v1.x) |
|
none |
Long version - -ptw-debug. Invokes the PTW debug mode. |
|
MACs |
Long version - -combine. Merge the given APs to a virtual one. |
|
none |
Long version - -wep-decloak. Run in WEP decloak mode. |
|
none |
Long version - -visual-inspection. Run in visual inspection mode. |
|
none |
Long version - -oneshot. Run in oneshot mode. |
|
none |
WPA cracking speed test. |
|
none |
Show the key in ASCII while cracking |
|
file> |
(WPA cracking) Create EWSA Project file v3 |
|
file |
(WPA cracking) Create Hashcat Capture file |
Created By
Metadata
Favourited By
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets
More Cheat Sheets by itnetsec