Aircrack-Ng For Windows
Aircrack-Ng For Windows
Aircrack-Ng For Windows
Aircrack-ng is the next generation of Christophe Devine's excellent aircrack suite of tools.
BREAKING WEP
BREAKING WPA
Once as many IVs as required have been captured using the airodump packet capture utility
the resultant [filename].cap file can be imported into aircrack to break the static WEP or
WPA-PSK keys.
cd c:\aircrack-ng-[version]
aircrack-ng.exe
Basic usage: aircrack -q -n [WEP key length] -b [BSSID] [filename].cap
C:\aircrack\bin\aircrack -q -n -b capture2.cap
Breaking WEP:
As you can see the capture file in use below (capture1.ivs) was created with airodump
capture option "Only capture WEP IVs (y/n)" set to "y" as the resultant file is in the .ivs
format. If n had been selected the resultant file would be in the .cap format.
Whilst this will work, we can could have cut down the cracking options for Aircrack-ng by
specifying the WEP key length (-n) or by specifying the target AP MAC address (-b) on the
command line:
As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in
only 4 seconds.
The capture file itself (capture1.ivs) is included here to test your own aircrack installs (note:
the file is a 5.77mb download).
Breaking WPA:
In order to be carry out the WPA dictionary attack using aircrack-ng we either have to:
1. Wait for a WPA client to associate to the network (This could take a while)
Either of these two method allows us to capture the WPA handshake, which is what we require
to perform a dictionary attack.
The downside to using this Windows version of aircrack-ng is that there are not any freely
available tools to perform this attack. So we have to either use a Linux tools (e.g. aireplay or
void11) or wait for an association to occur.
Which ever way we gather the WPA handshake we still use the same tool; airodump.
Once we think we have captured the WPA handshake, we simply run the capture file through
aircrack for confirmation:
If have confirmed we have the WPA handshake (as above) we can attempt the dictionary
attack:
As you can see above aircrack found the WPA PSK of "passphrase"
The capture file itself (capture2.cap) is included here to test your own aircrack installs
Installing Aircrack-ng
From sources
Requirements
Linux
Kernel headers and gcc as well as make have to be installed on your system.
On Debian-based distros (Debian, Ubuntu, Xubuntu, …), issue the following command in a
console to install them:
Windows
Development version require additional libraries to be installed:
wget http://www.sqlite.org/sqlite-3.5.5.tar.gz
tar -zxf sqlite-3.5.5.tar.gz
cd sqlite-3.5.5
./configure --disable-tcl
wget http://patches.aircrack-ng.org/sqlite-3.5.4-lib_cygwin.diff
patch -i sqlite-3.5.4-lib_cygwin.diff
# Some things (we don't need) don't compile on cygwin.
# We remove them with this patch.
make
make install
Compiling and installing
Stable
wget http://download.aircrack-ng.org/aircrack-ng-0.9.2.tar.gz
tar -zxvf aircrack-ng-0.9.2.tar.gz
cd aircrack-ng-0.9.2
make
make install
Development
Development version require some additional libraries:
wget http://download.aircrack-ng.org/aircrack-ng-1.0-beta2.tar.gz
tar -zxvf aircrack-ng-1.0-beta2.tar.gz
cd aircrack-ng-1.0-beta2
make
make install
make sqlite=true
make sqlite=true install
1. Copy 'developer' directory from the Airpcap CD at the same level as 'aircrack-ng'
directory
2. Append 'airpcap=true' parameter to make:
make airpcap=true
make install
Troubleshooting Tips
Solution:
The build directory gets installed together with the kernel headers, so either you lack the
correct headers or your KERNELPATH is wrong. Please check that `uname -r` returns “2.6.15-
28-amd64-generic”.
Do a “sudo apt-get install linux-headers-`uname -r`” or just “sudo apt-get install linux-
headers”.
If uname returns exactly that string and the current headers are installed, the remove the
headers and install them again. Also check /usr/src for installed header files, maybe it got
mixed up for whatever reason.
Solution: You are missing the OpenSSL development package. Depending on the distribution,
download and install openssl-devel or libssl-devel. Or worst case, install it from source:
http://www.openssl.org.
"zlib.h" No such file or directory
If you get something similar to:
Solution: You are missing the zlib development package. Depending on the distribution,
download and install zlib-devel. Or worst case, install it from source: http://www.zlib.net.
Windows
The Windows version of the aircrack-ng suite does not have an install program. You must
manually install (unzipping archive) the software.
• Download the latest version of the aircrack-ng suite for Windows to your PC. The
link for the zip file can be found on the Wiki home page.
• Unzip the contents of the aircrack-ng zip file into “C:\”. This will create a
directory called “aircrack-ng-0.9.2-win”. This directory name will vary based on
the exact version that you downloaded. This main directory contains three
subdirectories - “bin”, “src” and “test”.
• Manually download the following files and place them in the same directory as
the airodump-ng.exe file. Peek.dll and Peek5.sys
Prior to using the software, make sure to install the drivers for your particular wireless card.
See this link for the instructions.
To now use the aircrack-ng suite, start Windows Explorer and double click on Aircrack-ng
GUI.exe inside “bin” subdirectory. The GUI requires .NET Framework 2.0 to run (.NET
Framework 3.0 or 1.0/1.1 are not able to run this executable, 2.0 MUST be installed).
Alternatively, open a command prompt (Start menu → Execute → cmd.exe) and change to the
“C:\aircrack-ng-0.9-win\bin” directory and execute the individual commands.
Important notes:
Mind you, airodump-ng and aireplay-ng are linux only and will not work under OSX native, so
for reinjecting and sniffing you will have to use other means.
If you have an intel Mac check out the VMware Fusion option which is mentioned lower on this
page.
VMware image
Requirements
Starting
Notes:
• You don't need a driver for the device on the OS running VMware.
• The login credentials for the image are user id “root” with password “root”.
• The FAQ has some limited information about running the aircrack-ng suite under
VMWare.