:~# easside-ng -v de:ad:be:ef:ca:fe -m 3c:46:d8:4e:ef:aa -s 127.0.0.1 -f wlan0mon -c 6Īttack WPA only ( -W), display verbose output ( -v) and use monitor mode interface wlan0mon. :~# ivstools -merge *.ivs /root/all-ivs.ivsįirst, run buddy-ng, then launch the Easside-ng attack, specifying as many of the options as you can. pcap capture and save them to a new file: :~# ivstools -convert wep_64_ptw.cap out.ivs Strip out the initialization vectors of the provided. :~# aircrack-ng makeivs.ivsĪttack will be restarted every 5000 captured ivs. Specify a BSSID ( -b de:ad:be:ef:ca:fe), WEP key ( -k 123456789ABCDEF123456789AB), and output filename ( -w makeivs.ivs): :~# makeivs-ng -b de:ad:be:ef:ca:fe -k 123456789ABCDEF123456789AB -w makeivs.ivsĬreating 100000 IVs with 16 bytes of keystream each. Use the specified monitor mode interface ( -i wlan0mon) and target a single BSSID ( -v de:ad:be:ef:ca:fe): :~# wesside-ng -i wlan0mon -v de:ad:be:ef:ca:fe Parse the provided capture files ( wpa-psk-linksys.cap wpa.cap) and save any 4-way handshakes to a new file ( /root/handshakes.cap): :/usr/share/doc/aircrack-ng/examples# wpaclean /root/handshakes.cap wpa-psk-linksys.cap wpa.cap Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o cpg.png) and the graph type ( -g CAG): :~# airgraph-ng -i dump-01.csv -o cpg.png -g CPGĬreating your Graph using, dump-01.csv and writing to, cpg.png **** WARNING Images can be large, up to 12 Feet by 12 Feet****Ĭreating your Graph using, dump-01.csv and writing to, capr.pngĭepending on your system this can take a bit. Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o capr.png) and the graph type ( -g CAPR): :~# airgraph-ng -i dump-01.csv -o capr.png -g CAPR cap/.pcap format: :~# aircrack-ng all-ivs.ivs To have aircrack-ng conduct a WEP key attack on a capture file, pass it the filename, either in. Specify the wordlist to use ( -w password.lst) and the path to the capture file ( wpa.cap) containing at least one 4-way handshake. DARK Tool Documentation: aircrack-ng Usage Examples WPA Wordlist Mode