Aircrack-ng

The de facto standard open-source suite for 802.11 wireless network security auditing, covering packet capture, traffic analysis, injection, and WEP/WPA/WPA2 key recovery.

Developer

Thomas d'Otreppe & Community

verified_user
Visit Official Site open_in_new

description Technical Dossier

Aircrack-ng is a modular, command-line WiFi security auditing suite operating against 802.11a/b/g/n wireless LANs. Its toolset is organised around four disciplines: monitoring (airodump-ng for passive packet capture and network enumeration), attacking (aireplay-ng for deauthentication, ARP replay, chopchop, and fragmentation attacks via raw frame injection), testing (verifying adapter and driver capability for monitor mode and injection), and cracking (the aircrack-ng binary itself, which performs cryptanalytic key recovery). The suite requires a wireless adapter with a driver that exposes monitor mode and injection support.

WEP cracking leverages three statistical cryptanalytic methods: the original FMS (Fluhrer-Mantin-Shamir) attack, the improved KoreK attack, and the highly efficient PTW (Pyshkin-Tews-Weinmann) attack. Against WPA/WPA2-PSK, the approach shifts to capturing the four-way EAPOL handshake between a client and access point, then submitting it to offline dictionary or rule-based wordlist attacks. The suite integrates with GPU-acceleration tools like Hashcat for the cracking phase, while its native CPU cracking is multithreaded. Supporting utilities — airdecap-ng for decrypting captures, packetforge-ng for crafting custom frames, airbase-ng for rogue AP simulation — make the suite self-contained for most wireless audit workflows.

Aircrack-ng ships by default with Kali Linux, Parrot Security OS, BlackArch, and other penetration testing distributions. Its longevity (active since 2006), broad platform support, and coverage across attack phases have made it the most widely referenced open-source wireless security tool in both professional and academic contexts, with citations in CISA tooling references and standard network security curricula.

key WEP/WPA/WPA2 Key Recovery

Recovers encryption keys via FMS, PTW, and KoreK statistical attacks on WEP, and dictionary attacks against captured WPA/WPA2 four-way handshakes.

sensors Packet Capture & Monitoring

airodump-ng captures raw 802.11 frames in monitor mode, logging BSSID/ESSID/client associations and exporting to PCAP and CSV for analysis.

replay Packet Injection & Replay

aireplay-ng injects and replays frames to accelerate IV collection, execute deauthentication attacks, and simulate rogue access points.

settings_input_antenna Driver & Card Testing

Validates wireless adapter and driver support for monitor mode and raw frame injection, essential prerequisites for effective wireless auditing.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 82 / 100 High

settings_suggest Deployment Complexity

Low 30 / 100 High

engineering Technical Difficulty

Low 70 / 100 High
Aircrack-ng visualization
radar

Protocols

802.11 A/B/G/N

Language

C

Attacks

FMS, PTW, KOREK

License

GPL V2+